Thank you Sue for your review and your follow-up, and even proposing some new text. Much appreciated.

Authors, this is an example of a very dense document. I understand that the MPLS VPN + BGP + Multicast can get complex, but it's difficult to extract the deployment considerations out of these 60 pages.
There are some operational paragraph from time to time.

I agree with Sue when she mentions: "The whole draft is a set of rules for handling policy, BGP A-D routes, tunnel set-up, and PIM Join/leaves in the case of an intra net. Unless these rules are followed exactly, traffic may flow into a VPN it is not suppose to." This document doesn't give an operator “so-what” for deployment in 60 pages. You know, a few summary paragraphs that indicates where this specification is useful and where it is not for operators, and the potential fragility of the solution (which could be in a new operational consideration section or in the security considerations. I don't think I've seen text around coordination to set up filter, for example.

Sue has been trying to be helpful and even proposed some text:

   Whenever a VPN is provisioned, there is a risk that provisioning
   errors will result in an unintended cross-connection of VPNs, which
   would create a security problem for the customers.  Extranet can be
   particularly tricky, as it intentionally cross-connects VPNs, but in
   a manner that is intended to be strictly limited by policy.  If one
   is connecting two VPNs that have overlapping address spaces, one has
   to be sure that the inter-VPN traffic isn't to/from the part of the
   address space that is in the overlap.  The draft discusses a lot of
   the corner cases, and a lot of the scenarios in which things can go
   wrong.


Regards, Benoit
On to version -06 ...

On 12/23/2015 10:13 AM, Susan Hares wrote:

Sections which must be added to clear my concerns

----------------------------------------------------------------

*4.4.1 Extranet Source Extended Community *

To facilitate this, we define a new Transitive Opaque Extended Community, the "Extranet Source" Extended Community.

   The value field of this extended community is all zeros.

*Restrictions: *This value field MUST be set to zero upon origination, MUST be ignored upon reception and MUST be passed unchanged by intermediate routers.

*Additional Restrictions: *A Route Reflector MUST NOT add/remove the Extranet Source Extended Community from the VPN-IP routes reflected by the Route Reflector, including the case where VPN-IP routes received via IBGP are reflected to EBGP peers (inter-AS option (c), see [RFC6513] Section 10).


The draft has the following text in section 4.4.1 ("The Extranet Source Extended Community"):

"The value field of the Extended Community MUST be set to zero. "

"A PE router that interprets this Extended Community MUST ignore the contents of the value field."

and the following text in section 4.4.2 ("Distribution of Extranet Source Extended Community"):

"A Route Reflector MUST NOT add or remove the Extranet Source Extended Community from the VPN-IP routes reflected by the Route Reflector, including the case where VPN-IP routes received via IBGP are reflected to EBGP peers (inter-AS option (c), see [RFC6513] Section 10). The value of the Extended Community MUST NOT be changed by the route reflector."

"When re-advertising VPN-IP routes, ASBRs MUST NOT add/remove the Extranet Source Extended Community from these routes. This includes inter-AS options (b) and (c) (see [RFC6513] Section 10). The value of the Extended Community MUST NOT be changed by the ASBRs."

It seems to me that this contains the information you have requested. It may not be in the format you prefer, but I think it goes beyond the scope of an ops-dir review (or an IESG Discuss) to demand format changes.

*4.4.2 Extranet Separation Extended community *

**

We define a new Transitive Opaque Extended Community, the "Extranet Separation" Extended Community. This Extended Community is used only when extranet separation is being used.

*Restrictions:* Its value field MUST be set to zero upon origination, MUST be ignored upon reception, and MUST be

   passed unchanged by intermediate routers.

* Restrictions on Adding/deleting this community:* ?? (Eric – please add something here).

The draft now contains the following text in section 4.5 ("The Extranet Separation Extended Community"):

"We define a new Transitive Opaque Extended Community, the "Extranet Separation" Extended Community (see [RFC4360], [RFC7153], and Section 9 of this document). This Extended Community is used only when extranet separation is being used. Its value field MUST be set to zero upon origination, MUST be ignored upon reception, and MUST be passed unchanged by intermediate routers. A Route Reflector MUST NOT add or remove the Extranet Separation Extended Community from the routes it reflects, including the case where routes received via IBGP are reflected to EBGP peers (inter-AS option (c), see [RFC6513] Section 10)."

It seems to me that this contains the information you have requested.

*Comments that could be put in a Security section: *

**

Whenever a VPN is provisioned, there is a risk that provisioning errors will result in an unintended cross-connection of VPNs, which would create a security problem for the customers. Extranet can be particularly tricky, as it intentionally cross-connects VPNs, but in a manner that is intended to be strictly limited by policy.

The Security Considerations section already contains the following text:

"As is the case with any application of technology based upon [RFC4364], misconfiguration of the RTs may result in VPN security violations (i.e., may result in a packet being delivered to a VPN where, according to policy, it is not supposed to go)."

I don't think the above requested text really adds anything, it's just saying the same thing over again.

If one is connecting two VPNs that have overlapping address spaces, one has to be sure that the inter-VPN traffic isn't to/from the part of the address space that is in the overlap. The draft discusses a lot of the corner cases, and a lot of the scenarios in which things can go wrong.

The difficulty of dealing with overlapping address spaces when connecting two VPNs is already discussed extensively throughout the document. I don't see that the requested paragraph adds anything of substance.


_______________________________________________
BESS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/bess

Reply via email to