Re: Tsvart early review of draft-ietf-rtgwg-net2cloud-problem-statement-22

Robert Raszuk <robert@raszuk.net> Tue, 25 April 2023 06:21 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23F4FC151988 for <rtgwg@ietfa.amsl.com>; Mon, 24 Apr 2023 23:21:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hgLHxDr6FzcI for <rtgwg@ietfa.amsl.com>; Mon, 24 Apr 2023 23:21:38 -0700 (PDT)
Received: from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com [IPv6:2a00:1450:4864:20::32f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01A64C151986 for <rtgwg@ietf.org>; Mon, 24 Apr 2023 23:21:37 -0700 (PDT)
Received: by mail-wm1-x32f.google.com with SMTP id 5b1f17b1804b1-3f18335a870so34049055e9.0 for <rtgwg@ietf.org>; Mon, 24 Apr 2023 23:21:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; t=1682403695; x=1684995695; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=nLB15gq7lFoEEBAlR9nXD9zLqlDexFajGMK9YiSerO8=; b=AG9DA8xjduHupmo6wCH+NPGkFBN4XjyTRM17ZpwR+xbg1eFIbfMakkoqt/8fA8g93d xVbQBf8kAi36EKZEgFUi1r+pW9URBUFhx2oFmOnP1D0zNNmJ9bbznXimJZPcR0eZ4L+Y oP0S4xv9EqwKbij72ybzKgtJlTSQRdhInmntoN2qVCZSh2m3f6kl9suF3f5FOqpgZtNk UkxVzO1Hn9my5pkGL4Z9n6nv9++P/EC2bRPErZXrIecRiYCVI9JXKrucDyl2G1RibZ66 /NLgX26YIaL26BL07Wn8G520fvYiOwz1nwSBIFhTJeRq1yORJ70x0K31HrnVskvJ6vbx 69TA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682403695; x=1684995695; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=nLB15gq7lFoEEBAlR9nXD9zLqlDexFajGMK9YiSerO8=; b=h9LfpZo7HV8pvqB7Zadu74q0yx9T0dPL/MZcupO7FFHw7BJWet0HOqRDbSOkCKbZbX Q72cyIVhqtvBJopj47xsmGnhioHbQpc7LsVu5FNKB5nzP68ja+umceMaacHCCWl9uiOD jO2Vns8v3lnEtiw559gAdALl92iS/punnbFIaw8ipQ0gQFJDyHU/9qHB/qd0Ph/eabs7 0/XkaVOY23PE+uJyAfWqjYomEIpeAt9lmQeu5GMtY+zN/Vi1lTrNcqFi+YGJJzKcuSmR U+I0bO/Qy6C3YCcWmf/o2iPh1mWSLCcgrNUn01XdHIlNrhksc5NHIfsRyZsotk1D8H0e IP3Q==
X-Gm-Message-State: AAQBX9ffhWeQqDeayp3spgvzwU+RX8BKFr97KqD384g1YDqfNoTGv0Pj 3Y43B+TLFx9Bx/Uc6/DnAILvs97EqCUjUDoDehKo1Q==
X-Google-Smtp-Source: AKy350aaXLREJmaHXQMhgINM5BhdXU8vsvxroQZtTzTqO8x2n4sVSEFdkttDZ74B1gPKKWo+13lNRLoP9HqSmD94Cog=
X-Received: by 2002:a05:600c:22d4:b0:3f1:82c6:2d80 with SMTP id 20-20020a05600c22d400b003f182c62d80mr9736605wmg.5.1682403695364; Mon, 24 Apr 2023 23:21:35 -0700 (PDT)
MIME-Version: 1.0
References: <168055635654.11507.17750417804419163710@ietfa.amsl.com> <PH0PR13MB49229EDCFEC1D54173EA590585999@PH0PR13MB4922.namprd13.prod.outlook.com> <MN2PR19MB40453C4AC308C717B0C121FC83999@MN2PR19MB4045.namprd19.prod.outlook.com> <PH0PR13MB4922714D60DB74EFA4A5009885999@PH0PR13MB4922.namprd13.prod.outlook.com> <CAOj+MMHKwpzUNqo+xpDav9nXJBkEowBVykfLOVjhQYa6=cajSQ@mail.gmail.com> <CO1PR13MB49208FC93549FB01CDD4A6BB85679@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MME2uO=uTai0NfvgvasmOaXvo-899ZO7nr7HsHgSUr3ADQ@mail.gmail.com> <CO1PR13MB4920E00FE9B82BB939AC485085679@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMFa+wbrjPn=9+A_Wg06xD-RAv16RxkdJGX5V+PJVFOVLg@mail.gmail.com> <CO1PR13MB49201B98C2892D9B7928151485679@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMETX+RycuWPVAqDmz9Vn5HNv=SsOMyR2pJqTkoarx0FKA@mail.gmail.com> <CO1PR13MB4920836D9B96B38E90447E4C85649@CO1PR13MB4920.namprd13.prod.outlook.com>
In-Reply-To: <CO1PR13MB4920836D9B96B38E90447E4C85649@CO1PR13MB4920.namprd13.prod.outlook.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Tue, 25 Apr 2023 08:21:25 +0200
Message-ID: <CAOj+MME=7nU460pRYiqQ-nKm2VvFX5EnY_fOxEumYZZY_KUaQQ@mail.gmail.com>
Subject: Re: Tsvart early review of draft-ietf-rtgwg-net2cloud-problem-statement-22
To: Linda Dunbar <linda.dunbar@futurewei.com>
Cc: "Black, David" <David.Black@dell.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, "draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org" <draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Content-Type: multipart/related; boundary="000000000000a352d505fa232211"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/aX95EaO16RHM4EPMebQOdjjuaF8>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2023 06:21:42 -0000

Well those PEs provided someone is using VPNs are hardly ever co-located
with Cloud GWs - so in that respect the statement is misleading at best.

There is however a new wave of routing nodes being deployed by some IXPs
which enable L3 routing on a per tenant basis within the IXP fabric. Few
IXPs offer this today as a product.

Said this I have no concern - I was just hinting that if you want to make
the document complete the L2/L3 transit via IXP fabrics should not be
forgotten in the draft.

Thx,
R.

On Tue, Apr 25, 2023 at 3:45 AM Linda Dunbar <linda.dunbar@futurewei.com>
wrote:

> Robert,
>
>
>
> Will adding the following description address your concern?
>
> *Using a private VPN to connect an enterprise’s on-prem CPEs to a Cloud DC
> requires the private VPN has one or more PEs collocated with the Cloud GW
> at an IXP (Internet eXchange Point).*
>
>
>
> Linda
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Monday, April 24, 2023 5:01 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Cc:* Black, David <David.Black@dell.com>; tsv-art@ietf.org;
> draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org; rtgwg@ietf.org
> *Subject:* Re: Tsvart early review of
> draft-ietf-rtgwg-net2cloud-problem-statement-22
>
>
>
> Hi Linda,
>
>
>
> There are not IXP specific issues. The set of issues (or to say it more
> precisely suboptimality of connections) the entire draft is describing are
> equally applicable also to connections via IXP fabrics. That is why they
> should not be dismissed.
>
>
>
> Kind regards,
>
> Robert
>
>
>
> On Mon, Apr 24, 2023 at 11:54 PM Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> Robert,
>
>
>
> Can you write a section for the problems associated with connection via
> IXP? That will be greatly appreciated.
>
>
>
> Linda
>
>
>
>
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Monday, April 24, 2023 4:31 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Cc:* Black, David <David.Black@dell.com>; tsv-art@ietf.org;
> draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org; rtgwg@ietf.org
> *Subject:* Re: Tsvart early review of
> draft-ietf-rtgwg-net2cloud-problem-statement-22
>
>
>
>
>
> > Since the interconnect option via IXP fabric doesn’t have any problems,
> it is not included in the document.
>
>
>
> It is simply not true.
>
>
>
> Everything you are aiming to describe is equally applicable to
> interconnect to public clouds via IXPs.
>
>
>
> Regards,
>
> R.
>
>
>
>
>
>
>
>
>
> On Mon, Apr 24, 2023 at 11:20 PM Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> Robert,
>
>
>
> See below for the resolution:
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Monday, April 24, 2023 3:48 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Cc:* Black, David <David.Black@dell.com>; tsv-art@ietf.org;
> draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org; rtgwg@ietf.org
> *Subject:* Re: Tsvart early review of
> draft-ietf-rtgwg-net2cloud-problem-statement-22
>
>
>
> Hi Linda,
>
>
>
> Please see inline ..
>
>
>
> > [Linda] Cloud interconnect by IXP (AWS’s Direct Connect, Azure’s
>  ExpressRoute, etc.) has been added since version -22.
>
>
>
> AWS Direct Connect or Azure Express Route are just commercial product
> names to indicate direct attachment to AWS or Azure public clouds. I have
> setup those myself in the past.
>
>
>
> [Linda] The document doesn’t include the AWS/Azure commercial names. I
> used the name for example only.
>
>
>
> My point was technical not marketing and I meant to indicate that your
> document is missing technical description of the most
> attractive interconnect option which is via IXP fabric. AWS Direct Connect
> or Azure Express Route use leased lines or direct dark fiber to attach to
> public cloud edge ports.
>
>
>
> [Linda] The main reason of mentioning direct connection via private
> circuits in the Section 4.3 is to describe the preferable connection when
> the private VPN network can’t reach the desired Cloud DCs. ( IPsec tunnels
> can be used to dynamically connect the private VPN PEs with the desired
> Cloud DCs GWs. As the private VPNs provide more secure and higher quality
> services, choosing a PE closest to the Cloud GW for the IPsec tunnel is
> desirable to minimize the IPsec tunnel distance over the public Internet.)
>
>
>
> Since the interconnect option via IXP fabric doesn’t have any problems, it
> is not included in the document.
>
> Linda
>
>
>
>
>
> > By that I mean both layer 2 and layer 3 types of interconnect over IXes
> ?
>
> > [Linda] Layer 2 VPN, Layer 3 VPN has been added.
>
>
>
> Attachment via IXP does not require ANY VPN ! That is the crux of the
> point.
>
>
>
> > [Linda] Here is Azure suggested network connecting to clouds:
> https://learn.microsoft.com/en-us/azure/virtual-wan/sd-wan-connectivity-architecture
>
>
>
> See this illustration is incomplete. It misses the most important
> interconnect via IXP ports. It also misses Express Route remote extension
> which number of telcos and ISPs and IXPs are providing today.
>
>
>
> - -
>
>
>
> If you choose to proceed with an incomplete draft it's ok. My point was to
> just provide an observation of the current state.
>
>
>
> Kind regards,
>
> Robert
>
>
>
>
>
>
>
> On Mon, Apr 24, 2023 at 10:26 PM Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> Robert,
>
>
>
> Answers to your questions are inserted below:
>
>
>
> Linda
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Monday, April 17, 2023 1:31 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Cc:* Black, David <David.Black@dell.com>; tsv-art@ietf.org;
> draft-ietf-rtgwg-net2cloud-problem-statement.all@ietf.org; rtgwg@ietf.org
> *Subject:* Re: Tsvart early review of
> draft-ietf-rtgwg-net2cloud-problem-statement-22
>
>
>
> Hi Linda,
>
>
>
> Can you be so kind and elaborate why the document titled "net2cloud" does
> not even mention once the most popular way to connect to public clouds
> which is over IXP fabric(s) ?
>
> [Linda] Cloud interconnect by IXP (AWS’s Direct Connect, Azure’s
>  ExpressRoute, etc.) has been added since version -22.  Section 4.3 of the
> https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/
>
>
>
> By that I mean both layer 2 and layer 3 types of interconnect over IXes ?
>
> [Linda] Layer 2 VPN, Layer 3 VPN has been added.
>
>
>
> Looking holistically I also do not see much if at all discussion on
> host2cloud connectivity over Internet. If I connect to clouds today I use
> almost exclusively host2cloud model where my transit infrastructure is
> completely unaware underlay. And doing passive/active quality measurement
> over N disjoined paths I can rest assure you that it works perfectly well.
> The overlay can be of various sorts, but very often includes wireguard or
> wireguard like e2e encrypted pipes.
>
>
>
> [Linda] Here is Azure suggested network connecting to clouds:
> https://learn.microsoft.com/en-us/azure/virtual-wan/sd-wan-connectivity-architecture
>
>
>
> Linda
>
> Many thx,
>
> Robert
>
>
>
> PS. Btw I support in 100% all comments from Lukasz and do hope they get
> addressed.
>
>
>
>