Hi Lou,

If IPsec tunnels are used within data centers, the security need is well 
satisfied. However, the ECMP capability built on the UDP tunnels is lost at 
all. So, how about encapsulating IPsec ESP over UDP tunnels for load-balancing 
improvement purpose? Note that this ESP-over-UDP encapsulation is different 
from the ESP-over-UDP encapsulation as described in RFC3948: the former uses 
the UDP tunnel for load-balancing improvement purpose and therefore the source 
port is used as an entropy field, in contrast, the latter uses the UDP tunnel 
for NAT traversal purpose and therefore the source port is set to a constant 
value (i.e.,4500).

By the way, I had wrote a draft about this ESP-over-UDP approach (w/o 
submission) three years ago when considering how to use UDP tunnels to 
transport MPLS and IP traffic. If there is enough interest on this ESP-over-UDP 
approach, I can update it and then submit it for further discussion. 

Best regards,
Xiaohu

> -----Original Message-----
> From: nvo3 [mailto:[email protected]] On Behalf Of Lou Berger
> Sent: Wednesday, June 15, 2016 11:00 PM
> To: Linda Dunbar; Liyizhou; NVO3
> Subject: Re: [nvo3] FW: Any use cases of Overlay network requesting IPSec
> connection from the Underlay for a specific time span? (was : Flow Security
> Policies exchanged over I2NSF service layer interface?
> 
> 
> Yes -- this is a real use case.
> 
> This use case (overlays interconnected over IPsec tunnels with NVE end
> points) motivated our work on RFC5566 and we built supported for it (as well 
> as
> other tunnel technologies) in a quagga based NVO3 controller.
> This code is publicly available, but is not yet part of a standard quagga 
> release.
> 
> Lou
> 
> On 6/15/2016 8:55 AM, Linda Dunbar wrote:
> >
> > NVO3 Participants,
> >
> >
> >
> > I2NSF (Interface to Network Security function) has a work item in
> > defining the flow security policy between domains (which includes
> > inquiry of the capability from one domain to another and the actual
> > flow policy rules from one domain to another).
> >
> > Very often, the paths (or links) among nodes of a overlay network are
> > provided by other network operators (a.k.a. "underlay network").  The
> > flow policy rules are intended to filter out unwanted traffic from
> > underlay network so that various attack traffic won't saturated the
> > access links to the overlay nodes.
> >
> >
> >
> > One interesting scenario brought up is Overlay nodes may need to
> > request some traffic to be traversing IPsec channel. To achieve this
> > goal, it is necessary for Overlay Network controller to inquire if the
> > needed IPsec resource are even available before send the request (may
> > even involve AAA process between controllers of each corresponding
> > domain ).
> >
> >
> >
> > Want to have a survey if people see the use case of Overlay Network
> > needing portion of traffic to be through IPSec channel?
> >
> > IPSec is supposed to be between two end nodes. Here we assume that the
> > Overlay nodes don't have the resource or capability for IPsec, but
> > expect IPsec between flow's ingress and egress nodes (i.e. NVE).
> >
> >
> >
> > Any opinion is appreciated.
> >
> > Thanks,
> >
> > Linda
> >
> >
> >
> > *From:*Linda Dunbar
> > *Sent:* Tuesday, June 14, 2016 4:03 PM
> > *To:* '[email protected]'; BOUCADAIR Mohamed IMT/OLN
> > *Cc:* [email protected]
> > *Subject:* Any use cases of Overlay network requesting IPSec
> > connection from the Underlay for a specific time span? (was : Flow
> > Security Policies exchanged over I2NSF service layer interface?
> >
> >
> >
> > Christian,
> >
> >
> >
> > Your feedback seems to suggest that Overlay network Controller may
> > send request to the underlay network controller requesting IPsec
> > connections among overlay nodes. Do I understand you correctly?
> >
> >
> >
> > Are there any use cases of overlay network needing IPSec among their
> > nodes only for a specific time span? i.e. Time based IPSec connection?
> >
> >
> >
> > Linda
> >
> >
> >
> > *From:*[email protected]
> > <mailto:[email protected]>
> > [mailto:[email protected]]
> > *Sent:* Monday, June 13, 2016 11:23 AM
> > *To:* Linda Dunbar; BOUCADAIR Mohamed IMT/OLN
> > *Subject:* RE: Any feedback on the Protocol Independent Flow Security
> > Policies exchanged over I2NSF service layer interface?
> >
> >
> >
> >
> >
> > *[snip]*
> >
> >
> >
> >
> >
> >
> >
> > Very often, the paths (or links) among nodes of a overlay network are
> > provided by other network operators (a.k.a. "underlay network").  Very
> > much like traditional networks placing FW (Firewall) or IPS (Intrusion
> > Prevention System) on the wire to enforce the flow security rules,
> > I2NSF *_Protocol Independent Flow Security Policies_* can be used by
> > overlay networks to request certain flow based security rules to be
> > enforced by its underlay networks, to prevent the unwanted attacks
> > traffic from occupying the physical links and ports to the overlay
> > network nodes, and to avoid the overlay nodes' CPU/Storage/Port
> > utilization being consumed down by the various attacks.  Here is one
> > example of "Overlay Video Communication network" exchange Flow
> > Policies to the Underlay network.
> >
> >
> >
> >
> >
> > cid:[email protected]
> >
> >
> >
> > */[CJ] /*The above example clearly shows the necessary interaction
> > between the two PDPs/controllers, to make sure that decisions made by
> > the network controller accommodate the needs of the video customer as
> > possibly expressed towards the video controller: for example, customer
> > demands that the confidentiality of the videoconference needs to be
> > preserved, thereby suggesting the use of the IPsec protocol suite. The
> > video controller may enforce an IPsec design based upon the transport
> > mode, whereas the network controller is solicited to allocate IPsec
> > resources (read for example no AH, ESP in NULL mode) accordingly. This
> > may possibly raise conflicting configuration tasks (the video
> > controller uses AH, the network controller doesn't), thereby leading
> > to inconsistency that may jeopardize the service. Whether BGP FS is
> > used to carry security policy information between the two controllers
> > is hardly the point, imho: what matters is the consistency of the
> > (flow-based security policies enforced by both parties, and which
> > should be derived from the customer's requirements (if any).
> >
> > The goal of I2NSF is to specify the common information model and data
> > model for the *_ Protocol Independent Flow Security Policies _*which
> > can be queried and set between domains.
> >
> > [CJ] OK.
> >
> > * *
> >
> > https://datatracker.ietf.org/doc/draft-fang-i2nsf-inter-cloud-ddos-mit
> > igation-api/ is just the starting point. (needs more work to improve
> > the clarity).
> > We are asking if people to express their opinion on this work to the
> > [email protected] <mailto:[email protected]> list.
> >
> > [CJ] I need to read this draft and will get back to you accordingly,
> > but this may take a couple of weeks as I'm pretty busy for the time being.
> >
> >
> >
> > I'll let Med further comment as appropriate.
> >
> >
> >
> > Cheers,
> >
> >
> >
> > Christian.
> >
> >
> >
> > Thanks, Linda
> >
> >
> >
> >
> _____________________________________________________________
> _________
> > ___________________________________________________
> >
> > Ce message et ses pieces jointes peuvent contenir des informations
> > confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
> > exploites ou copies sans autorisation. Si vous avez recu ce message
> > par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que 
> > les pieces
> jointes. Les messages electroniques etant susceptibles d'alteration, Orange
> decline toute responsabilite si ce message a ete altere, deforme ou falsifie. 
> Merci.
> >
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should not be
> distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the sender and 
> > delete this
> message and its attachments.
> > As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> > Thank you.
> >
> >
> > _______________________________________________
> > nvo3 mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/nvo3
> 
> 
> _______________________________________________
> nvo3 mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/nvo3

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to