Re: [OPSAWG] Benjamin Kaduk's No Objection on draft-ietf-opsawg-vpn-common-10: (with COMMENT)

mohamed.boucadair@orange.com Tue, 28 September 2021 06:39 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C43123A2007; Mon, 27 Sep 2021 23:39:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ANy8_NG56Ohx; Mon, 27 Sep 2021 23:39:47 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0016D3A2006; Mon, 27 Sep 2021 23:39:46 -0700 (PDT)
Received: from opfednr05.francetelecom.fr (unknown [xx.xx.xx.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr23.francetelecom.fr (ESMTP service) with ESMTPS id 4HJVH51kclz5wlS; Tue, 28 Sep 2021 08:39:45 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1632811185; bh=xQcPIOKDYtKbePSkdTp3+nY+SuoswV4AafLoGxHrYqY=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=aLHvfpMqIMXL3V48Oabswm8HB8EM6vzLjQHNxBLiwwKjOiPw2/qPKYi+2m6mn78sD /LUOkEw4mf+Yz7enSt7tEBUfXDKo4H8N846St+tVwSgFfB28RJ0Q0BPlZJBC/hCYWy p7Qw4SLYZY5xA4/QWURNWc8EAtDkk3JclBVf/k6nuL0XpTyqbkiyxDF0Sps2JKofcD F5urA7F52bbqZmFU3oui/bJ/uB53HZQHrHuXfW3cCXYNtcAacwFZsvHoW/FJc1Yi1a vtiZX5WBdtCrJcZ0tSqZzSdmW6zHN2JYOUqvv4SDv1PCKGKZSInbd1cOoZr2TP4un8 X8eZ5bzqzRS3Q==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfednr05.francetelecom.fr (ESMTP service) with ESMTPS id 4HJVH50tT0zyQF; Tue, 28 Sep 2021 08:39:45 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "draft-ietf-opsawg-vpn-common@ietf.org" <draft-ietf-opsawg-vpn-common@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>
Thread-Topic: Benjamin Kaduk's No Objection on draft-ietf-opsawg-vpn-common-10: (with COMMENT)
Thread-Index: AQHXs+gwuKxph1sHHkGx6gFJmt5cLKu496kQ
Date: Tue, 28 Sep 2021 06:39:44 +0000
Message-ID: <7316_1632811185_6152B8B1_7316_489_1_787AE7BB302AE849A7480A190F8B93303540DF82@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <163228433689.15360.5801797210059919693@ietfa.amsl.com> <9002_1632303618_614AFA02_9002_448_1_787AE7BB302AE849A7480A190F8B93303540A6A0@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <20210927213857.GH98042@kduck.mit.edu>
In-Reply-To: <20210927213857.GH98042@kduck.mit.edu>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/Aeca8J7puTMUaAL62S8LJLluQSs>
Subject: Re: [OPSAWG] Benjamin Kaduk's No Objection on draft-ietf-opsawg-vpn-common-10: (with COMMENT)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 06:39:53 -0000

Hi Ben, 

Thank you for the follow-up. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Benjamin Kaduk <kaduk@mit.edu>
> Envoyé : lundi 27 septembre 2021 23:39
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : The IESG <iesg@ietf.org>; draft-ietf-opsawg-vpn-common@ietf.org;
> opsawg-chairs@ietf.org; opsawg@ietf.org; adrian@olddog.co.uk
> Objet : Re: Benjamin Kaduk's No Objection on draft-ietf-opsawg-vpn-common-
> 10: (with COMMENT)
> 
> Hi Med,
> 
> On Wed, Sep 22, 2021 at 09:40:17AM +0000, mohamed.boucadair@orange.com
> wrote:
> > Hi Ben,
> >
> > Thank you for the review. The changes to address your review can be
> > tracked at:
> > https://github.com/IETF-OPSAWG-WG/lxnm/commit/108707e8b2aea6590b0a9695
> > 756c7546887c9614
> 
> Thanks.  Also inline...
> 
> 
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De : Benjamin Kaduk via Datatracker [mailto:noreply@ietf.org] Envoyé
> > > : mercredi 22 septembre 2021 06:19 À : The IESG <iesg@ietf.org> Cc :
> > > draft-ietf-opsawg-vpn-common@ietf.org; opsawg-chairs@ietf.org;
> > > opsawg@ietf.org; adrian@olddog.co.uk; adrian@olddog.co.uk Objet :
> > > Benjamin Kaduk's No Objection on draft-ietf-opsawg-vpn-common-
> > > 10: (with COMMENT)
> > >
> > > Benjamin Kaduk has entered the following ballot position for
> > > draft-ietf-opsawg-vpn-common-10: No Objection
> > >
> > > When responding, please keep the subject line intact and reply to
> > > all email addresses included in the To and CC lines. (Feel free to
> > > cut this introductory paragraph, however.)
> > >
> > >
> > > Please refer to https://www.ietf.org/blog/handling-iesg-ballot-
> > > positions/
> > > for more information about how to handle DISCUSS and COMMENT
> positions.
> > >
> > >
> > > The document, along with other ballot positions, can be found here:
> > > https://datatracker.ietf.org/doc/draft-ietf-opsawg-vpn-common/
> > >
> > >
> > >
> > > --------------------------------------------------------------------
> > > --
> > > COMMENT:
> > > --------------------------------------------------------------------
> > > --
> > >
> > > I have a bold proposal for consideration: since we are defining a
> > > new common set of groupings for VPN and, in some cases, proposing to
> > > rename existing terminology already, can we consider moving away
> > > from the term "VPN" itself?  The word "private" is ambiguous as to
> > > what level of privacy is being provided (e.g., network routing vs
> > > cryptographic) and who the conveyed content is to be private from.
> > > A term like "virtual network" removes that ambiguity, and lets us
> > > use the explicit attributes to convey whether encryption is in use
> when appropriate.
> > >
> > > There is no particular triggering point (at least, not yet) at which
> > > it becomes clearly correct to make a breaking change like this, so
> > > we may end up just having to pick a time somewhat arbitrarily, if we
> > > are to make such a change at all.  Perhaps now is that time; perhaps
> not.
> >
> > [[Med]] I hear some of your observations but VPN is a well-established
> name for a widely deployed technology. I don't think it is a good idea to
> touch this. Please note that there is already generic model for VNs
> (https://datatracker.ietf.org/doc/draft-ietf-teas-actn-vn-yang/) that is
> distinct from what we are doing here.
> 
> Well, I don't think that just because VPN is well-established we should
> ignore the ambiguity in what it describes.  So, I still want to touch it
> at some point, but do not insist on doing so right now.  I am sure that we
> can find some non-VPN term other than VN if there is desire to
> distinguish...but we can defer that conversation, of course.

[Med] Sure, we can always find better names, but I think it is better to have this discussion when revising documents such as RFC4026. Thank you. 

> 
> > >
> > > Section 3
> > >
> > >           grouping vpn-profile-cfg
> > >             +-- valid-provider-identifiers
> > >                +-- external-connectivity-identifier* [id]
> > >                |       {external-connectivity}?
> > >                |  +-- id?   string
> > >
> > > Presumably I am just misreading RFC 8340, but I thought that the
> > > list key was implicitly mandatory, so it would appear as just "id"
> > > (as opposed to "id?").  (Many instances.)
> >
> > [[Med]] Good question. Actually we trusted what is in Section 3.2 of
> 8340. That's the output we get from pyang. Note that ? is not displayed
> when the grouping is used in another model (L2NM/L3NM). Will double check
> this with Martin.
> 
> Thanks.
> 
> > >
> > >    'vpn-route-targets':
> > >       *  A YANG grouping that defines Route Target (RT) import/export
> > >          rules used in a BGP-enabled VPN (e.g., [RFC4364][RFC4664]).
> > >
> > > On very quick skim, it's not clear what motivates the RFC 4664
> > > reference
> > > -- "route target" does not appear, for example, nor does "import" or
> > > "export".
> >
> > [[Med]] This is just to insist that it can be used for both L3 and
> L2VPNs. Unlike L3NM, there are plenty L2VPN technologies; hence the choice
> to point to a generic L2 framework.
> 
> Okay, so the references are just generic "VPN" (or "BGP-enabled VPN")
> references, and I was misreading to ascribe more meaning to them.
> 
> If we wanted to spend a few more words (far from clear), maybe "(suitable
> VPN technologies include but are not limited to [RFC4364][RFC4664])".

[Med] OK. Changed the text to: "This grouping can be used for both L3VPNs [RFC4364] and L2VPNs [RFC4664]."

> 
> > >
> > > Section 4
> > >
> > >      identity pim-proto {
> > >        if-feature "pim";
> > >        base routing-protocol-type;
> > >
> > > This is in the section with the group-management-protocols; is
> > > "routing- protocol-type" really the intended base?
> >
> > [[Med]] Yes. Both PIM and other group management protocols fall under:
> >
> >   /*
> >    * Identities related to multicast
> >    */
> >
> > >
> > >      identity embb {
> > >      [...]
> > >      identity urllc {
> > >      [...]
> > >      identity mmtc {
> > >
> > > Similar to Roman's comment, a reference seems useful for these.
> > > If we intend to implicitly rely on RFCs 8299 and/or 8466 for
> > > terminology, we should say so in the terminology section.
> >
> > [[Med]] Added this note under the terminology section:
> >
> >    The document inherits many terms from [RFC8299] and [RFC8466]
> >    (e.g., Enhanced Mobile Broadband (eMBB), Ultra-Reliable and Low
> >    Latency Communications (URLLC), Massive Machine Type Communications
> >    (mMTC)).
> 
> Thanks!
> 
> > >
> > >        leaf vpn-id {
> > >          type vpn-common:vpn-id;
> > >          description
> > >            "A VPN identifier that uniquely identifies a VPN.
> > >             This identifier has a local meaning, e.g., within
> > >             a service provider network.";
> > >
> > > Thank you for indicating the scope of validity of the identifier!
> > > (Elsewhere as well.)
> > >
> > >      grouping service-status {
> > >        [...]
> > >            leaf last-change {
> > >              type yang:date-and-time;
> > >              description
> > >                "Indicates the actual date and time of the service
> status
> > >                 change.";
> > >
> > > What's the motiviation behind leaving this as "config true"?  When
> > > would it be useful to set it manually?
> >
> > [[Med]] This can be set, for example, when a new administrative status
> is set.
> 
> But would it be set to a time other than the time when the new
> administrative status was set, i.e., a value that can be automatically
> determined?

[Med] Yes, think about service calendaring scenarios. 

> 
> > >
> > >        list vpn-target {
> > >          [...]
> > >          leaf id {
> > >            type int8;
> > >            description
> > >              "Identifies each VPN Target.";
> > >
> > > I wasn't able to find the motivation for limiting to int8 in RFC
> > > 4364, though I mostly assume I'm just looking in the wrong place.
> >
> > [[Med]] I confirm that there is no such concept in 4364. The intuitive
> design would be to use leaf-list, but the reason for having this is a list
> with an id is recorded in this note:
> >
> >          Note that this is modelled as a list to ease the reuse of this
> >          grouping in modules where a pointer is needed (e.g., associate
> >          an operator with RTs).
> >
> > We don't see the need to go beyond uint8. As illustrated, for example,
> in L3NM a typical usage of this would be simply:
> 
> Okay.  I am not sure if "pointer" or "index" is better for conveying the
> desired meaning ("pointer" might suggest "leafref" to some readers).

[Med] Changed to "where an RT identifier". 

> 
> > ==
> >                          "vpn-targets": {
> >                            "vpn-target": [
> >                              {
> >                                "id": "1",
> >                                "route-targets": [
> >                                  "0:65550:1"
> >                                ],
> >                                "route-target-type": "both"
> >                              }
> >                            ]
> >                          }
> > ==
> >
> > > (But why *signed* int8?)
> >
> > [[Med]] This should be unsigned. Fixed.
> >
> > >
> > > Section 5
> > >
> > > While there may be no direct security considerations from what is
> > > effectively just defining some new compound types for reuse, I think
> > > we may want to consider some privacy considerations.  For example,
> > > we have the "customer-name" field in the vpn-description, and it is
> > > sometimes the case that customers want to remain confidential.
> > > Thus, any instantiations of the grouping would incur a potential
> > > need for confidentiality and minimizing the scope of distribution.
> > >
> >
> > [[Med]] We do already discuss this for example in the L3NM. No problem
> to add a note here as well. I added this NEW text:
> >
> >    Modules that use the groupings that are defined in this document
> >    should identify the corresponding security considerations.  For
> >    example, reusing some of these groupings will expose privacy-related
> >    information (e.g., customer-name).  Disclosing such information may
> >    be considered as a violation of the customer-provider trust
> >    relationship.
> 
> Thanks, that looks good.
> 
> >
> > > NITS
> > >
> > > Section 4
> > >
> > >      feature bearer-reference {
> > >        description
> > >          "Indicates support for the bearer reference access
> constraint.
> > >           That is, the reuse of a network connection that was already
> > >           ordered to the service provider apart from the IP VPN
> > > site.";
> > >
> > > I echo Roman's comment that this feature would benefit from a
> > > reference or further discussion; the current description leaves me
> > > unclear on what is meant and with no recourse for learning more.
> > > (RFCs 4026 and 4176 are presented as generic references for
> > > VPN-related terms, but do not cover the concept of "bearer
> > > reference".)
> >
> > [[Med]] The description is basically echoing RFC8299:
> >
> > ==
> >    o  The "bearer-reference" parameter is used in cases where the
> >       customer has already ordered a network connection to the SP apart
> >       from the IP VPN site and wants to reuse this connection.
> > ==
> >
> > We can update the description to first introduce the concept of bearer:
> >
> >       "A bearer refers to properties of the CE-PE attachment that
> >        are below Layer 3.
> 
> Thanks; combined with the note in the intro about 8299 terminology that
> should be enough for people to figure it out.
> 
> And thanks for the other updates as well,
> 
> Ben


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.