On Tue, 27 Nov 2018, Gabriel Lopez wrote:

Hi Paul, all

Please find attached some answers to your comments. Let’s go section by 
section, it will be easier to follow the discussion.


      El 18 nov 2018, a las 7:52, Paul Wouters <[email protected]> escribió:


General comments:
I'd like to see "Case 1" and "Case 2" replaced with more descriptive terms. I 
keep losing track of which case is which.
Perhaps call them IKE Case and IKE-less Case ?


[Authors] We agree. What about "IKE-full" and "IKE-less" cases?

Hmm, I find "IKE-full" a bit odd (also because in English you would
probably say "full-IKE" and not "IKE-full". Maybe another word could
be "IKE-managed" or "IKE-controled" or "IKE-delegated" ?

[Authors]  Thanks for the suggestion. Certainly the text is not reflecting the 
existence of those techniques alleviating the task of establishing IPsec SAs. 
Nonetheless,
we have to clarify that this draft is not only guided by the SDWAN scenario 
and, in fact, it is intended to be applicable in other foreseeable SDN 
deployments.  With
this in mind, we propose the following changes in the text:


s/"Typically, traditional IPsec VPN concentrators and, in general,
   entities (i.e. hosts or security gateways) supporting IKE/IPsec, must
   be configured directly by the administrator.  This makes the IPsec
   security association (SA) management difficult and generates a lack
   of flexibility, specially if the number of security policies and SAs
   to handle is high.  With the growth of SDN-based scenarios where
   network resources are deployed in an autonomous manner, a mechanism
   to manage IPsec SAs according to the SDN architecture becomes more
   relevant.  Thus, the SDN-based service described in this document
   will autonomously deal with IPsec SAs management." /
   
   "With the growth of SDN-based scenarios where
   network resources are deployed in an autonomous manner, a mechanism
   to manage IPsec SAs according to the SDN architecture becomes more
   relevant."
   
s/"An example of usage can be the notion of Software Defined WAN (SD-
   WAN), SDN extension providing a software abstraction to create secure
   network overlays over traditional WAN and branch networks.  SD-WAN is
   based on IPsec as underlying security protocol and aims to provide
   flexible, automated, fast deployment and on-demand security network
   services." /
   
   "An example of usage can be the notion of Software Defined WAN (SD-
   WAN), SDN extension providing a software abstraction to create secure
   network overlays over traditional WAN and branch networks.  SD-WAN is
   based on IPsec as underlying security protocol and aims to provide
   flexible, automated, fast deployment and on-demand security network
   services. Other examples are host-to-host or full-mesh encryption. 
   Thus, the SDN-based service described in this document will autonomously 
deal with IPsec 
   SAs management.

works for me.

        The analysis of the host-to-gateway (roadwarrior) scenario is TBD.

      Does this sentence mean this is to be done in this document or is it out
      of scope for this document (but it does allow it to be added later) ?

[Authors] We do not see a clear use case for roadwarrior scenarios based on 
SDN, the proposal
  is to remove it from this document. 

The case I can think of is if this is a "site to site" connection but
one site is on dynamic IP (eg cable modem or 4g/5g connection) ?

The only difference in yang would be to instead of a static ip or
hostname, to also allow a value of "any IP". In libreswan we use
the string "%any" (and %any4 or %any6) but one could also use 0.0.0.0
to mean that. I don't think it needs any other special handling (other
then making sure an endpoint 0.0.0.0 should not use an IP based
identity.

Paul

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to