Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem

Lou Berger <lberger@labn.net> Fri, 16 November 2012 00:46 UTC

Return-Path: <lberger@labn.net>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3A051F0C6A for <ipsec@ietfa.amsl.com>; Thu, 15 Nov 2012 16:46:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.051
X-Spam-Level:
X-Spam-Status: No, score=-101.051 tagged_above=-999 required=5 tests=[AWL=0.614, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, J_CHICKENPOX_14=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ENkfs1InfTZF for <ipsec@ietfa.amsl.com>; Thu, 15 Nov 2012 16:46:43 -0800 (PST)
Received: from oproxy8-pub.bluehost.com (oproxy8-pub.bluehost.com [69.89.22.20]) by ietfa.amsl.com (Postfix) with SMTP id 54FE91F041A for <ipsec@ietf.org>; Thu, 15 Nov 2012 16:46:42 -0800 (PST)
Received: (qmail 13182 invoked by uid 0); 16 Nov 2012 00:46:20 -0000
Received: from unknown (HELO box313.bluehost.com) (69.89.31.113) by oproxy8.bluehost.com with SMTP; 16 Nov 2012 00:46:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=J+N2NA/l+oASQsz5n9mSg9HURUy7/FZIO5cH/m0KVLc=; b=swNxGkLKso158GwWS6Cj7Us20pujfEIzs8gkBwpIXIMg01/gQ4e3LYlRxFGokSREeO+cVfECmBoGMDZkKxs7D30zN/Xk4awqGM2D9Nil+6E+NV95yj56/p5sZn+V7R3d;
Received: from box313.bluehost.com ([69.89.31.113]:50159 helo=[127.0.0.1]) by box313.bluehost.com with esmtpa (Exim 4.76) (envelope-from <lberger@labn.net>) id 1TZA4a-00010Z-Bi; Thu, 15 Nov 2012 17:46:20 -0700
Message-ID: <50A58CDB.30402@labn.net>
Date: Thu, 15 Nov 2012 19:46:19 -0500
From: Lou Berger <lberger@labn.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121026 Thunderbird/16.0.2
MIME-Version: 1.0
To: Vishwas Manral <vishwas.ietf@gmail.com>
References: <50A5703F.4070305@labn.net> <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com>
In-Reply-To: <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com>
X-Enigmail-Version: 1.4.5
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Identified-User: {1038:box313.bluehost.com:labnmobi:labn.net} {sentby:smtp auth 69.89.31.113 authed with lberger@labn.net}
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Nov 2012 00:46:44 -0000

Vishwas,
	Thanks for the quick response.  Please see below.

On 11/15/2012 7:14 PM, Vishwas Manral wrote:
> Hi Lou,
> 
> Thanks a lot for your detailed comments. I have just started to change
> the document today, based on feedback I got on the list, so your
> comments come at a good time. My answers are inline:
> 
>     In section 1.1, you define the term gateway.  I'm assuming that you are
>     using the term in the normal IPsec context, and that it includes IPsec
>     enabled routers.  Is this correct?  If not, the text should make this
>     clear, and you can ignore the rest of my mail!
> 
> Yes, the idea is an IPsec gateway will have Routing functionality too.
> Now whether its a tunnel gateway with routing embedded or the otehr way
> around is debatable. I also agree Routing is a big part of the
> functionality to be optimized, though I would consider it a different
> sub-part of the solution.
> 
> 
>     Assuming such routers are within scope, there are some complicating
>     issues with IPsec enabled routers that I think should be called out.  I
>     don't think much text is needed to cover this case. I'm not sure the
>     best way to address these, but I have some suggestions to get the
>     conversation started (and yes, I expect that you'll edit the text):
> 
>     - In section 2.2, I think mentioning something about the routing
>     implications is worthwhile. How about at the end of the section adding
>     something along the lines of :
> 
>         Additionally, the routing implications of gateway-to-gateway
>         communication must be addressed.  In the simple case,
>         selectors provide sufficient information for a gateway to
>         forward traffic appropriately.  In other cases, additional
>         tunneling (e.g., GRE) and routing (e.g., OSPF) protocols are
>         run over IPsec tunnels, and the configuration impact on those
>         protocols must be considered.  There is also the case when
>         L3VPNs operate over IPsec Tunnels.
> 
> We can add something in the lines of additional protocols are run over
> the IPsec tunnels and the solution should make an effort to allow for
> additional protocols like OSPF to be run optimally without too many
> changes in configuration.
> 
> Infact we have a requirement to the effect in section 4.1

yes, this is what I referred to as 4.2 below, and suggested some
replacement text...

> 
>     Gateways MUST allow tunnel binding, such that applications like
>    Routing using the tunnels can work seamlessly without any updates to
>    the higher level application configuration i.e.  OSPF configuration.
> 
> 
> 
>  
> 
>     - In section 4.2, how about:
>        (replacement text)
>        3.  Gateways MUST allow for the operation of tunneling and
>        routing protocols operating over spoke-to-spoke IPsec Tunnels
>        with minimal, or no, configuration impact.
> 
>     and (new text)
> 
> I cannot find Section 4.2 in the document 
> http://tools.ietf.org/html/draft-ietf-ipsecme-ad-vpn-problem-00 is there
> more context you can provide for the same.

4.2 = 4.1

>  
> 
>        X.  The solution SHOULD support BGP/MPLS IP VPNs, see [RFC4364].
> 
>     If you want, you can make the "SHOULD" a "MUST", and "support" could be
>     "be compatible with".
> 
> I do not want to go ahead into details of what other routing solutions
> it should support.
> 
> With that said I am not sure what you mean by having BGP MPLS VPN in an
> ADVPN scenario. BGP MPLS VPN is a provider provisioned VPN solution,
> this is a customer provisioned one. 

Ahh, interesting point.  When I read the document I was looking to see
if it was scoped purely to CE/customer based solutions.  Reading section
2 (intro) and 2.2, I saw no such restriction.  So I think section 2.2
should be explicit on this point either way. Which is why I proposed the
text "There is also the case when L3VPNs operate over IPsec Tunnels."
(To explicitly include this case.)  If the WG wants this case excluded,
that's fine too.

> I see the 2 working in different
> layers, and interacting only in edge gateways where both solutions have
> an edge.

Sure, but the problem exists for both.

Thanks,
Lou
> 
> 
>     I also have a few more minor comments:
> 
> I am ok with the minor suggestions you have.
> 
> Thanks,
> Vishwas
>  
> 
> 
>     - In section 2.1, you introduce the term "NAT gateway" and then later
>     use just "gateway" when I suspect you mean "NAT gateway".  I suggest
>     using the term "NAT" and thereby not introduce possible confusion
>     between the gateway term defined in section 1.1 and "NAT gateways".
> 
>     - In section 2.2, s/occupies/requires
> 
>     - In sections 2.2, and Section 3.2 you say dynamic addresses makes
>     static configuration impossible.  This doesn't reflect the use of
>     dynamic dns to handle this issues (and is currently supported by some
>     vendors.)
> 
>     Let me know what you think,
>     Lou
>     _______________________________________________
>     IPsec mailing list
>     IPsec@ietf.org <mailto:IPsec@ietf.org>
>     https://www.ietf.org/mailman/listinfo/ipsec
> 
> 
>