RE: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
"Adrian Farrel" <adrian@olddog.co.uk> Sun, 30 March 2014 19:41 UTC
Return-Path: <adrian@olddog.co.uk>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id 6022A1A08DA for <l2vpn@ietfa.amsl.com>;
Sun, 30 Mar 2014 12:41:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.383
X-Spam-Level:
X-Spam-Status: No,
score=-98.383 tagged_above=-999 required=5 tests=[BAYES_05=-0.5,
RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_NONE=-0.0001,
RCVD_IN_SORBS_WEB=0.77, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p9E9ZcsbDY0V for
<l2vpn@ietfa.amsl.com>; Sun, 30 Mar 2014 12:41:27 -0700 (PDT)
Received: from asmtp2.iomartmail.com (asmtp2.iomartmail.com [62.128.201.249])
by ietfa.amsl.com (Postfix) with ESMTP id 493781A08D6 for <l2vpn@ietf.org>;
Sun, 30 Mar 2014 12:41:27 -0700 (PDT)
Received: from asmtp2.iomartmail.com (localhost.localdomain [127.0.0.1]) by
asmtp2.iomartmail.com (8.13.8/8.13.8) with ESMTP id s2UJfMAp029532;
Sun, 30 Mar 2014 20:41:22 +0100
Received: from 950129200 (108.26.90.92.rev.sfr.net [92.90.26.108])
(authenticated bits=0) by asmtp2.iomartmail.com (8.13.8/8.13.8) with ESMTP id
s2UJfKnW029518 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO);
Sun, 30 Mar 2014 20:41:21 +0100
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "'Lizhong Jin'" <lizho.jin@gmail.com>,
<draft-ietf-l2vpn-vpls-inter-domain-redundancy.all@tools.ietf.org>
References: <0aaa01cf45f0$7d04ae00$770e0a00$@olddog.co.uk>
<53345952.a70e440a.2a29.4f84@mx.google.com>
In-Reply-To: <53345952.a70e440a.2a29.4f84@mx.google.com>
Subject: RE: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
Date: Sun, 30 Mar 2014 20:41:20 +0100
Message-ID: <016601cf4c50$078c8ce0$16a5a6a0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKieMH6bvwQq0oDr/K5WljRkwwysgG2FEXSmUX6OZA=
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1576-7.5.0.1017-20600.002
X-TM-AS-Result: No--34.071-10.0-31-10
X-imss-scan-details: No--34.071-10.0-31-10
X-TMASE-MatchedRID: A5gI4x1FTANDZFBd1jLr/vHkpkyUphL9cqe/MA7DLQ4M74Nf6tTB9k61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Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/lilH8qJyMl-y7R19V7oIictIcXA
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: adrian@olddog.co.uk
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Mar 2014 19:41:29 -0000
Hi Lizhong, > Sorry for the late reply. Please see my reply inline below. > Please co-authors help to correct if I am wrong. [snip] > > I can't see how this is a BCP. I realise that RFC 2026 section 5 is not > > really clearly written, but this is a technical spec that describes how > > to build a particular function in the network. Standards Track would be > > just fine (even though there are no bits and bytes defined) because you > > are defining procedures (using 2119 language) that an implementation > > has to perform to make this function work (i.e., interoperate). > > [Lizhong] thank you for pointing out this. We will change to Standards Track. Good. I hope the WG is paying attention! > > Section 1 > > > > Please give a little more information about what the "solution" is. You > > don't need to go into full detail, but you do need to give some > > overview. Things I'd like to see covered... > > - motivation is to provide service protection mechanisms in the event > > of edge node failure > > - basic mechanism is to provide edge node redundancy > > - solution is dependent on the use of ICCP (with reference) to > > coordinate between redundant edge nodes > > - no changes to any protocol message formats are needed for this > > solution and no new protocol options are defined > > - this solution is a description of how existing protocol building > > blocks may be deployed to achieve the desired function, but also > > defines implementation behavior necessary for the function to work. > [Lizhong] accepted, and I try to rephrase as below: > In many existing Virtual Private LAN Service (VPLS) deployments based on > [RFC4762], inter-domain connectivity has been deployed without node > redundancy, or with node redundancy in a single domain. This document is to > provide a service protection mechanism for inter-domain VPLS based on > [RFC4762]. The protection mechanism will provide edge node redundancy and > link redundancy in both domains. The domain in this document refers to > autonomous system (AS), or other administrative domains. > The solution relies on the use of ICCP [ietf-pwe3-iccp] to coordinate between > redundant edge nodes, and use of Pseudowire (PW) Preferential Forwarding > Status Bit [RFC 6870] to negotiate the PW status. There is no change to any > protocol message formats and no new protocol options introduced. This solution > is a description of reusing existing protocol building blocks to achieve the desired > function, but also defines implementation behavior necessary for the function to > work. Works for me. [snip] > > Figure 2 might usefully be redrawn to show how PW3 and PW4 attach to > > the PEs. > [Lizhong] do you mean the PW is broken to the PE in the figure? Will fix that. > Thanks. Yeah. PW3 should connect to PE3 etc. > > Section 5 says > > > > For the inter-domain four-PW scenario, > > it is required for PEs to ensure that the same mode is supported on > > the two ICCP peers in the same redundancy group (RG). > > > > But you don't say how this is achieved. > [Lizhong] will add: One method to ensure mode consistency is by manual > operation. Other methods are also possible and is out of the scope of this > document. I'm OK with that, but it is a bit thin. Operators are famous for not configuring the same thing at two ends of a link. > > Section 5.2 > > > > Before > > deploying this inter-domain VPLS, the operators MUST negotiate to > > configure same PW high/low priority at two PW end-points. > > > > How do they do this? > [Lizhong] we check this with the operator. When they do inter-AS connection, > there will be some kind of contract to ensure the interconnection. The PW > priority could be one part of the contract/negotiation. This is more of the > operation method. Now I think we should not use RFC2119 word "MUST" here. > "should" would be a better word here. Yup, "should" is better, and maybe add "The inter-domain VPLS relationship normally involves a contractual process between operators, and the configuration of PW roles forms part of this process." > > Section 5.3 > > > > In this use case, there are generally three options > > > > So, sometimes two options and sometimes four options? :-) > > Delete "generally", but also make clear what the three options are. > [Lizhong] it would be clear to say: In this use case, there are two options to > provide protection: 1:1 and 3:1 protection. OK [snip] > > Section 6 > > > > There seem to be some independent actions needed (operator negotiation, > > setting of mode). Are these security vulnerabilities? > > > > ICCP is being run on the Internet and not in a chassis. Does that make > > a difference to the security model? > [Lizhong] yes, more consideration is required. I try to change: > Besides of the security properties of [I-D.ietf-pwe3-iccp] and [RFC4762], this draft > will have additional security consideration. > When deploying the inter-domain redundancy mechanism described in this > document, some manual operation/negotiation is required to be done correctly > and securely. E.g., each node within one RG should be configured with same > redundancy mode; the two operators should negotiate to configure same PW > priority at two nodes. If the configuration consistency is broken, the inter-domain > redundancy mechanism may not work properly. > Since ICCP is now deployed between two PEs or ASBRs, the LDP session could be > secured with TCP Authentication Option [RFC5925]. This provides integrity and > authentication for the ICCP messages. The LDP MD5 authentication key option, as > described in section 2.9 of [RFC5036] MAY also be used. That is good except that MD5 is pretty much regarded as useless as a security tool these days. How about adding to the end of your text: "The attention of implementers and deployers is drawn to [RFC6941] and [RFC6952] with special attention to the recommendation to use TCP-AO [RFC5925] for enhanced security of LDP sessions." Cheers, Adrian
- AD review of draft-ietf-l2vpn-vpls-inter-domain-r… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- Re: AD review of draft-ietf-l2vpn-vpls-inter-doma… Loa Andersson
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel