Re: [bess] comments and suggestions to draft-rosen-bess-secure-l3vpn-01

Jeff Tantsura <jefftant.ietf@gmail.com> Sat, 07 July 2018 00:15 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C616131057; Fri, 6 Jul 2018 17:15:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.008
X-Spam-Level:
X-Spam-Status: No, score=-0.008 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mogFps-g8ljT; Fri, 6 Jul 2018 17:15:39 -0700 (PDT)
Received: from mail-it0-x242.google.com (mail-it0-x242.google.com [IPv6:2607:f8b0:4001:c0b::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 292B1130DD5; Fri, 6 Jul 2018 17:15:39 -0700 (PDT)
Received: by mail-it0-x242.google.com with SMTP id p17-v6so19399694itc.2; Fri, 06 Jul 2018 17:15:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=x2P+Pqr9H73hBKr9xX0sHK6GiG0Psfcs8aZOfINw6jc=; b=FAzHQfE/FgfH6/I7hV8WaZxSSs3V2BEWQEaijggwqGFAYx1up2FCGCp/0MPx6RKz+Z lEq9PERd3Owj8SDmAS4XjPaBjFFxP/hsmVMwliPB9F7v4RQkmTzAzLKuRVM5vDOszb7+ zh+xik7ScBU2RAAj/2bXWwsUud0QGKZqZnV50F/ZZBfOBuOfJPe20/EK5laz6qYKUwVj LMzj7EPiT/xqtgb9IkuJpoCoyp7GlbkHAGTLoSNrSLez/QKgwFOv10spx7zRKUYKD2Ur Z5Re6k50FqoY/EiJAheA4z8wYEGlcGLra/bLH6mzCZL5P3q16BKas3HgkNkPYvJOOS81 B1Hw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=x2P+Pqr9H73hBKr9xX0sHK6GiG0Psfcs8aZOfINw6jc=; b=I8djtzkCyhlBPohS3/ep4PgRijySP6irlEahDI/mX2eoTwkegHfcSsNsaL+2nr7T+i ZsGn4o05BNpIJP7ZYhwWgFV1qA5yVLK4hLbK/p7gE3sfQBXfsApV84qdcLk/o1w2gEHU 0k/svqVuhMH73J4gv0XkjmOfjTd9mhzlosMJTQ5bdF9ztd+7ojm+eBQ0QNBkx0wfoL3T 2hj+reWUX9SKigxHmxkJZIVWtHXswtct9eFNAt1X0SJCZi/GjMWzt4lI6emAAplVgnqI 0MbVPOvYOr2yDmXFYvILZx6ujlpFUCe/F2fLdwfLm2PIt1PU0INfACYUN0NxT79f6NnY q1+Q==
X-Gm-Message-State: APt69E2dMBCrzgxiojG62YurlEdiqwDIo9jJGDgnwKof+un9XWszVRgI p226n3NqSJvMjg85dG3qQkng/xV7
X-Google-Smtp-Source: AAOMgpcQ3e0329YtyaYm4NNSpOoMk0s/EF1ZdFS9t6YSbteMhYwYO5b1w20xv/bpTjuiy4d6npvQxw==
X-Received: by 2002:a24:643:: with SMTP id 64-v6mr10265111itv.109.1530922538380; Fri, 06 Jul 2018 17:15:38 -0700 (PDT)
Received: from [192.168.0.122] (47-36-65-40.dhcp.reno.nv.charter.com. [47.36.65.40]) by smtp.gmail.com with ESMTPSA id o64-v6sm5192823ioe.30.2018.07.06.17.15.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 06 Jul 2018 17:15:37 -0700 (PDT)
Content-Type: multipart/alternative; boundary=Apple-Mail-B9DD4DBE-AFAA-4E98-BAE0-7B1C4AEC641F
Mime-Version: 1.0 (1.0)
Subject: Re: [bess] comments and suggestions to draft-rosen-bess-secure-l3vpn-01
From: Jeff Tantsura <jefftant.ietf@gmail.com>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <DM2PR05MB448D2B060B09D4275A9BC6AAE470@DM2PR05MB448.namprd05.prod.outlook.com>
Date: Fri, 6 Jul 2018 17:15:36 -0700
Cc: Linda Dunbar <linda.dunbar@huawei.com>, Robert Raszuk <robert@raszuk.net>, RTGWG <rtgwg@ietf.org>, Eric Rosen <erosen@juniper.net>, "bess@ietf.org" <bess@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <14EDAB4B-1023-4084-93CC-C1C6AA36C081@gmail.com>
References: <4A95BA014132FF49AE685FAB4B9F17F66B07E161@sjceml521-mbs.china.huawei.com> <DM2PR05MB4485047CBE1ABF17FBE7083AE470@DM2PR05MB448.namprd05.prod.outlook.com> <4A95BA014132FF49AE685FAB4B9F17F66B07EB23@sjceml521-mbs.china.huawei.com> <CA+b+ERnwvYF4JdoiHhPPBYds-Tm9EPyZm6vPLdscjNtKhqTY4A@mail.gmail.com> <49131D01-708D-4A17-9521-F0DEA6891FC9@gmail.com> <4A95BA014132FF49AE685FAB4B9F17F66B07EDB4@sjceml521-mbs.china.huawei.com> <DM2PR05MB448D2B060B09D4275A9BC6AAE470@DM2PR05MB448.namprd05.prod.outlook.com>
To: Ron Bonica <rbonica@juniper.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/qlp6NPBwNA2SueIVxSuL5o1LbE4>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Jul 2018 00:15:43 -0000

There are also many companies using EVPN as the control plane.
It is important to find a “golden middle” where on one side we achieve interoperability but on another don’t hinder the innovation in that, fast growing space.
Data planes are a jungle and would not be standardized any time soon.
However - an abstraction on top would be very useful.

Regards,
Jeff

> On Jul 6, 2018, at 14:23, Ron Bonica <rbonica@juniper.net> wrote:
> 
> +1
>  
> Let’s follow up on this discussion in Montreal.
>  
> From: Linda Dunbar <linda.dunbar@huawei.com> 
> Sent: Friday, July 6, 2018 4:33 PM
> To: Jeff Tantsura <jefftant.ietf@gmail.com>om>; Robert Raszuk <robert@raszuk.net>
> Cc: Ron Bonica <rbonica@juniper.net>et>; RTGWG <rtgwg@ietf.org>rg>; Eric Rosen <erosen@juniper.net>et>; bess@ietf.org
> Subject: RE: [bess] comments and suggestions to draft-rosen-bess-secure-l3vpn-01
>  
> Jess,
>  
> Great Action! There are much more than the Data modeling.
> A lot to be done in Control Plane. Many SD-WAN deployment (ours included) use NHRP/DMVPN/DSPVN to manage routes via internet. But NHRP being developed decades ago (for ATM) just doesn’t scale to support Managed Overlay network of 100s or 1000s CPEs.
>  
> Linda
>  
> From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Jeff Tantsura
> Sent: Friday, July 06, 2018 3:20 PM
> To: Robert Raszuk <robert@raszuk.net>
> Cc: Ron Bonica <rbonica@juniper.net>et>; RTGWG <rtgwg@ietf.org>rg>; Eric Rosen <erosen@juniper.net>et>; bess@ietf.org; Linda Dunbar <linda.dunbar@huawei.com>
> Subject: Re: [bess] comments and suggestions to draft-rosen-bess-secure-l3vpn-01
>  
> Robert/Linda,
>  
> RTGWG chairs have been thinking of starting SD-WAN discussion in RTGWG.
> Service data modeling(data modeling in general)is an obvious candidate (at ONUG we started, there’s some early effort, but IETF help is needed).
> Control plane interworking is another interesting topic.
> Please bring your ideas, I’m still working on agenda
>  
> 
> Regards,
> Jeff
> 
> On Jul 6, 2018, at 13:12, Robert Raszuk <robert@raszuk.net> wrote:
> 
> Hi Linda,
>  
> What you are expressing is very clear and in fact happens today on any good SD-WAN controller. 
>  
> But in the context of this discussion are you bringing it here to suggest that draft-rosen-bess-secure-l3vpn should have such functionality build in ? 
>  
> Personally I don't think it really belongs in this draft as perfect sweet spot for it still IMHO resides on a SD-WAN controller. Pushing all that logic into BGP may be a bit excessive ...
>  
> Many thx,
> R.
>  
>  
> On Fri, Jul 6, 2018 at 9:32 PM, Linda Dunbar <linda.dunbar@huawei.com> wrote:
> Ron,
>  
> This is referring to a Managed Overlay WAN services with many CPEs (large scale SD-WAN) and where
> -        there are many CPEs at each location and multiple WAN ports on each CPE
> 
> -        SD-WAN Controller needs to detour a path between Site -A-&  Site-B via another site (e.g. Site-C) for reasons like Performance, Regulatory,  or others. Instead of designating to specific CPE of the site-C.
> 
>  
> It is preferable to partition CPEs to clusters, as shown in the figure below:
>  
> 
>  
> Do I explain well? If not, can we talk face to face in Montreal?
>  
> Thanks, Linda Dunbar
>  
> From: Ron Bonica [mailto:rbonica@juniper.net] 
> Sent: Friday, July 06, 2018 1:25 PM
> To: Linda Dunbar <linda.dunbar@huawei.com>om>; Eric Rosen <erosen@juniper.net>et>; bess@ietf.org
> Subject: RE: comments and suggestions to draft-rosen-bess-secure-l3vpn-01
>  
> Hi Linda,
>  
> I’m not sure that I understand what you mean when you say, “aggregate CPE-based VPN routes with internet routes that interconnect the CPEs”. Could you elaborate?
>  
>                                                             Ron
>  
>  
> From: Linda Dunbar <linda.dunbar@huawei.com> 
> Sent: Thursday, July 5, 2018 11:53 AM
> To: Eric Rosen <erosen@juniper.net>et>; Ron Bonica <rbonica@juniper.net>et>; bess@ietf.org
> Subject: comments and suggestions to draft-rosen-bess-secure-l3vpn-01
>  
> Eric and Ron,
>  
> We think that the method described in your draft is useful for CPE based EVPN, especially for SD-WAN between CPEs.
> But, it misses some aspects to aggregate CPE-based VPN routes with internet routes that interconnect the CPEs.
>  
> Question to you: Would you like to expand your draft to cover the scenario of aggregating CPE-based VPN routes with internet routes that interconnect the CPEs?
>  
> If yes, we think the following areas are needed:
>  
> •        For RR communication with CPE, this draft only mentioned IPSEC. Are there any reasons that TLS/DTLS are not added? 
> 
> •        The draft assumes that C-PE “register” with the RR. But it doesn’t say how. Should “NHRP” (modified version) be considered?
> 
> •        It assumes that C-PE and RR are connected by IPsec tunnel. With zero touch provisioning, we need an automatic way to synchronize the IPSec SA between C-PE and RR. The draft assumes:
> 
> p  A C-PE must also be provisioned with whatever additional information is needed in order to set up an IPsec SA with each of the red RRs
> 
> •        IPsec requires periodic refreshment of the keys. How to synchronize the refreshment among multiple nodes?
> 
> •        IPsec usually only send configuration parameters to two end points and let the two end points to negotiate the KEY. Now we assume that RR is responsible for creating the KEY for all end points. When one end point is confiscated, all other connections are impacted.
> 
>  
> If you are open to expand your draft to cover SD-WAN, we can help providing the sections to address the bullets mentioned above.
>  
> We have a draft analyzing the technological gaps when using SD-WAN to interconnect workloads & apps hosted in various locations: https://datatracker.ietf.org/doc/draft-dm-net2cloud-gap-analysis/
> Appreciate your comments and suggestions to our gap analysis.
>  
>  
> Thanks, Linda Dunbar
>  
> 
> _______________________________________________
> BESS mailing list
> BESS@ietf.org
> https://www.ietf.org/mailman/listinfo/bess
> 
>  
> _______________________________________________
> BESS mailing list
> BESS@ietf.org
> https://www.ietf.org/mailman/listinfo/bess