Again, Linda, as discussed with you multiple times, my draft is really about 
extending current 
draft-ietf-idr-tunnel-encaps<https://datatracker.ietf.org/doc/draft-ietf-idr-tunnel-encaps/>
 to cover IPsec tunnel and other encryption tunnel like DTLS in next revsion 
(based on the feedback I got from Prague);
My draft is not intended to address SDN for IPsec use case and it does not 
require a central controller, and there are use cases where a central 
controller is not needed or can’t be used, my draft is intended for those cases;

So I really don’t see any conflict here

From: IPsec <ipsec-boun...@ietf.org> On Behalf Of Fernando Pere?íguez García
Sent: Monday, April 1, 2019 3:05 PM
To: Linda Dunbar <linda.dun...@huawei.com>
Cc: Roman Danyliw <r...@cert.org>; idr wg <i...@ietf.org>; 
stephane.litkow...@orange.com; i2...@ietf.org; idr-cha...@ietf.org; Gabriel 
López Millán <gab...@um.es>; Yoav Nir <ynir.i...@gmail.com>; Alvaro Retana 
<aretana.i...@gmail.com>; ipsec@ietf.org WG <ipsec@ietf.org>; Benjamin Kaduk 
<ka...@mit.edu>; Rafa Marin Lopez <r...@um.es>; Paul Wouters <p...@nohats.ca>
Subject: Re: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration 
(draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller 
facilitated IPsec configuration

Hi Linda,

We have revised draft-hujun-idr-bgp-ipsec and, to the best of our 
understanding, we do not see any conflict with our draft being discussed in 
I2NSF. The IPsec attributes configured through BGP are only the peer’s tunnel 
address and local/remote subnet prefixes (that are used for the traffic 
selectors).  The rest of the IPsec configuration (AH/ESP, cryptographic 
algorithms, keys, etc.) are obtained via a “color mapping”, which is something 
not covered by the draft since it assumes routers are somehow pre-provisioned 
with this information.

Thus, we do not see this draft is also facing the task of formalizing the 
complete configuration of an IPsec device. We appreciate any clarification in 
case we are wrong.

Best regards,
Fernando..

El jue., 28 mar. 2019 a las 16:01, Linda Dunbar 
(<linda.dun...@huawei.com<mailto:linda.dun...@huawei.com>>) escribió:

Just to reiterate the concerns and issues I raised during IDR Thurs session 
discussion on using BGP signaling to achieve IPsec Tunnel configuration 
(draft-hujun-idr-bgp-ipsec).
Copy I2NSF WG because there is similar discussion for over a year.
Copy IPsecme WG as the group has many experts on the IPsec configuration.


1.      I2NSF WG has an on-going discussion on Controller facilitated IPsec 
configuration which has been discussed for over a year.  Even though the 
I2NSF’s  IPsec Configuration is between Controller and devices, whereas the BGP 
signaling IPsec Configuration proposed by draft-hujun-idr-bgp-ipsec is between 
peers, the configuration parameters to the devices are for the same purpose, 
therefore, should be aligned to avoid future conflicts to the industry.



2.      When using IPsec Tunnel between two peers, usually they are separated 
by untrusted domain. If Router “A” is allowed to  gets the IPsec tunnel 
configurations from peers across untrusted domain (instead of the today’s 
practice of from administrators), then many issues come up, for example:



How can a router “A” trust the Traffic Selection policy from a remote peer B? 
If the router “A” already has its Traffic Selection policy configured for a 
specific IPsec tunnel, but different from the Traffic Selection policy from 
remote peer B, which policy should Route A enforce for the IPsec Tunnel?  If 
the router “A” doesn’t have Traffic Selection policy specified, there are two 
remote nodes B & C signaling the “A” with different Traffic Selection policy, 
what should A do?



3.      RFC5566 only specifies a simple indication of IPsec Encap, but doesn’t 
do any of the IPsec configuration portion.



As indicated by BESS WG chair, there are multiple drafts addressing IPsec in 
BESS, IDR, and WGs in Security Area, involved Chairs and ADs may need to agree 
where is the home for continuing the discussion to avoid future conflicts.


Cheers,
Linda Dunbar
_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org>
https://www.ietf.org/mailman/listinfo/ipsec


--
----------------------------------------------------------------------------------------------------
Fernando Pereñíguez García, PhD
Department of Sciences and Informatics
University Defense Center, (CUD), Spanish Air Force Academy, MDE-UPCT
C/ Coronel Lopez Peña, s/n, 30720, San Javier, Murcia - SPAIN
Tel: +34 968 189 946 Fax: +34 968 189 970
------------------------------------------------------------------------------------------------------
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to