RE: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy

"Lizhong Jin" <lizho.jin@gmail.com> Mon, 31 March 2014 14:47 UTC

Return-Path: <lizho.jin@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 353BC1A0A24 for <l2vpn@ietfa.amsl.com>; Mon, 31 Mar 2014 07:47:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FeMhbduSGpHn for <l2vpn@ietfa.amsl.com>; Mon, 31 Mar 2014 07:47:38 -0700 (PDT)
Received: from mail-pb0-x22c.google.com (mail-pb0-x22c.google.com [IPv6:2607:f8b0:400e:c01::22c]) by ietfa.amsl.com (Postfix) with ESMTP id B577F1A6F0A for <l2vpn@ietf.org>; Mon, 31 Mar 2014 07:47:38 -0700 (PDT)
Received: by mail-pb0-f44.google.com with SMTP id rp16so8287283pbb.31 for <l2vpn@ietf.org>; Mon, 31 Mar 2014 07:47:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type:content-transfer-encoding:thread-index :content-language; bh=SZ+U0T1cnXYF8+I7hU32qkUu1FX4RXAlha546dp44i4=; b=gM56gSp4qqpRfoG2RHrasUmOjiGH8Rgdy3StXsMMCeTFooa4vaHLJfCfSlT+QOwH58 QbSTyTM5lc1247/0wCpFRDCGc/od0mbfRJv+7kftta6YIK7ggnwfi0jTFZqR8Mn3GGWD MQ7yOAnbxGo7d18tpIU5ok3bLALjkWsOxsWx8Gqwz0t/lKCdHJzGY2wpkp5GD7XXCpyI fGZXy4HsTifdEZcMZjokrIN0YhH7E9F7NmScE/pqDxQg5s6F1xRn7x6xX+7Rko9ODWw8 qK6bdfyJGoYXbx66nkN8cLkxahJM05IJ0xgZATJkp0v2SW4F8E8DptRQHhSTVnE1ha6W JNeA==
X-Received: by 10.66.189.226 with SMTP id gl2mr25619939pac.65.1396277255609; Mon, 31 Mar 2014 07:47:35 -0700 (PDT)
Received: from LIZHONGJ ([140.206.240.36]) by mx.google.com with ESMTPSA id fk4sm41665592pab.23.2014.03.31.07.47.30 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 31 Mar 2014 07:47:34 -0700 (PDT)
From: "Lizhong Jin" <lizho.jin@gmail.com>
To: <adrian@olddog.co.uk>, <draft-ietf-l2vpn-vpls-inter-domain-redundancy.all@tools.ietf.org>
References: <0aaa01cf45f0$7d04ae00$770e0a00$@olddog.co.uk> <53345952.a70e440a.2a29.4f84@mx.google.com> <016601cf4c50$078c8ce0$16a5a6a0$@olddog.co.uk>
In-Reply-To: <016601cf4c50$078c8ce0$16a5a6a0$@olddog.co.uk>
Subject: RE: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
Date: Mon, 31 Mar 2014 22:47:24 +0800
Message-ID: <011d01cf4cf0$2702f140$7508d3c0$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKieMH6bvwQq0oDr/K5WljRkwwysgG2FEXSAieGbsqZNfiKYA==
Content-Language: zh-cn
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/tCiFpxznJEmp9kJttcQgRzftcYM
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Mar 2014 14:47:46 -0000

Hi Adrian,
Thank you for the quick reply. See my reply inline below.
We will post a new version accordingly soon to reflect these comments.

Regards
Lizhong

> -----Original Message-----
> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
> Sent: 2014年3月31日 3:41
> To: 'Lizhong Jin'; draft-ietf-l2vpn-vpls-inter-domain-
> redundancy.all@tools.ietf.org
> Cc: l2vpn@ietf.org
> Subject: RE: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
> 
> Hi Lizhong,
> 
> > Sorry for the late reply. Please see my reply inline below.
> > Please co-authors help to correct if I am wrong.
> 
> [snip]
> 
> > > I can't see how this is a BCP. I realise that RFC 2026 section 5 is
> > > not really clearly written, but this is a technical spec that
> > > describes how to build a particular function in the network.
> > > Standards Track would be just fine (even though there are no bits
> > > and bytes defined) because you are defining procedures (using 2119
> > > language) that an implementation has to perform to make this function
> work (i.e., interoperate).
> >
> > [Lizhong] thank you for pointing out this. We will change to Standards Track.
> 
> Good. I hope the WG is paying attention!
[Lizhong] OK, we will post a new version accordingly.

> 
> > > Section 1
> > >
> > > Please give a little more information about what the "solution" is.
> > > You don't need to go into full detail, but you do need to give some
> > > overview. Things I'd like to see covered...
> > > - motivation is to provide service protection mechanisms in the event
> > >   of edge node failure
> > > - basic mechanism is to provide edge node redundancy
> > > - solution is dependent on the use of ICCP (with reference) to
> > >   coordinate between redundant edge nodes
> > > - no changes to any protocol message formats are needed for this
> > >   solution and no new protocol options are defined
> > > - this solution is a description of how existing protocol building
> > >   blocks may be deployed to achieve the desired function, but also
> > >   defines implementation behavior necessary for the function to work.
> > [Lizhong] accepted, and I try to rephrase as below:
> > In many existing Virtual Private LAN Service (VPLS) deployments based
> > on [RFC4762], inter-domain connectivity has been deployed without node
> > redundancy, or with node redundancy in a single domain.  This document
> > is to provide a service protection mechanism for inter-domain VPLS
> > based on [RFC4762]. The protection mechanism will provide edge node
> > redundancy and link redundancy in both domains.  The domain in this
> > document refers to autonomous system (AS), or other administrative
> domains.
> > The solution relies on the use of ICCP [ietf-pwe3-iccp] to coordinate
> > between redundant edge nodes, and use of Pseudowire (PW) Preferential
> > Forwarding Status Bit [RFC 6870] to negotiate the PW status. There is
> > no change to any protocol message formats and no new protocol options
> > introduced. This solution is a description of reusing existing
> > protocol building blocks to achieve the desired function, but also
> > defines implementation behavior necessary for the function to work.
> 
> Works for me.
[Lizhong] Thanks.
> 
> [snip]
> 
> > > Figure 2 might usefully be redrawn to show how PW3 and PW4 attach to
> > > the PEs.
> > [Lizhong] do you mean the PW is broken to the PE in the figure? Will fix that.
> > Thanks.
> 
> Yeah. PW3 should connect to PE3 etc.
[Lizhong] Thanks.
> 
> > > Section 5 says
> > >
> > >    For the inter-domain four-PW scenario,
> > >    it is required for PEs to ensure that the same mode is supported on
> > >    the two ICCP peers in the same redundancy group (RG).
> > >
> > > But you don't say how this is achieved.
> > [Lizhong] will add: One method to ensure mode consistency is by manual
> > operation. Other methods are also possible and is out of the scope of
> > this document.
> 
> I'm OK with that, but it is a bit thin. Operators are famous for not configuring
> the same thing at two ends of a link.
[Lizhong] I understand. At current stage, let's keep it simple.

> 
> > > Section 5.2
> > >
> > >    Before
> > >    deploying this inter-domain VPLS, the operators MUST negotiate to
> > >    configure same PW high/low priority at two PW end-points.
> > >
> > > How do they do this?
> > [Lizhong] we check this with the operator. When they do inter-AS
> > connection, there will be some kind of contract to ensure the
> > interconnection. The PW priority could be one part of the
> > contract/negotiation. This is more of the operation method. Now I think we
> should not use RFC2119 word "MUST" here.
> > "should" would be a better word here.
> 
> Yup, "should" is better, and maybe add "The inter-domain VPLS relationship
> normally involves a contractual process between operators, and the
> configuration of PW roles forms part of this process."
[Lizhong] OK, thanks.

> 
> > > Section 5.3
> > >
> > >    In this use case, there are generally three options
> > >
> > > So, sometimes two options and sometimes four options? :-) Delete
> > > "generally", but also make clear what the three options are.
> > [Lizhong] it would be clear to say: In this use case, there are two
> > options to provide protection: 1:1 and 3:1 protection.
> 
> OK
> 
> [snip]
> 
> > > Section 6
> > >
> > > There seem to be some independent actions needed (operator
> > > negotiation, setting of mode). Are these security vulnerabilities?
> > >
> > > ICCP is being run on the Internet and not in a chassis. Does that
> > > make a difference to the security model?
> > [Lizhong] yes, more consideration is required. I try to change:
> > Besides of the security properties of [I-D.ietf-pwe3-iccp] and
> > [RFC4762], this draft will have additional security consideration.
> > When deploying the inter-domain redundancy mechanism described in this
> > document, some manual operation/negotiation is required to be done
> > correctly and securely. E.g., each node within one RG should be
> > configured with same redundancy mode; the two operators should
> > negotiate to configure same PW priority at two nodes. If the
> > configuration consistency is broken, the inter-domain redundancy
> mechanism may not work properly.
> > Since ICCP is now deployed between two PEs or ASBRs, the LDP session
> > could be secured with TCP Authentication Option [RFC5925]. This
> > provides integrity and authentication for the ICCP messages. The LDP
> > MD5 authentication key option, as described in section 2.9 of [RFC5036]
> MAY also be used.
> 
> That is good except that MD5 is pretty much regarded as useless as a security
> tool these days.
> 
> How about adding to the end of your text:
> 
> "The attention of implementers and deployers is drawn to [RFC6941]  and
> [RFC6952] with special attention to the recommendation to use TCP-AO
> [RFC5925] for enhanced security of LDP sessions."
[Lizhong] OK, thanks.

> 
> Cheers,
> Adrian
>