Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-25 Thread Valery Smyslov
Hi Rafa, thank you for adding this text. I think these are the very minimum recommendations that are needed to help implementers to handle various error cases correctly. Regards, Valery. From: Rafa Marin Lopez Sent: Thursday, July 25, 2019 5:54 PM To: Valery Smyslov Cc: Rafa Mari

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-25 Thread Rafa Marin Lopez
Hi Valery: Great!. Thanks for these comments. Very valuable. Following your suggestion we would like to add similar text to part of the I-D describing the process of IPsec SA installation. This is inline with the previous text about rekeying we sent: "Figure 4 describes the IKE-less case, whe

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-23 Thread Valery Smyslov
Hi Rafa, Hi Valery: El 22 jul 2019, a las 18:07, Valery Smyslov mailto:smyslov.i...@gmail.com> > escribió: Hi Yoav, I think that it is not the performance of the SC that would matter, but the possible delays in the network. If we think of the network connecting the SC and the

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-23 Thread Rafa Marin-Lopez
Hi Valery: > El 22 jul 2019, a las 18:07, Valery Smyslov escribió: > > Hi Yoav, > > I think that it is not the performance of the SC that would matter, > but the possible delays in the network. If we think of the network > connecting the SC and the NSFs as of one close to "ideal", then we have

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Valery Smyslov
Hi Yoav, I think that it is not the performance of the SC that would matter, but the possible delays in the network. If we think of the network connecting the SC and the NSFs as of one close to "ideal", then we have no problems. Otherwise the SC must be prepared to deal with network issues

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Yoav Nir
Hi, Valery Obviously, you need a security controller that scales to the number of SAs it needs to generate. But generating an SA in the IKE-less case is just generating 72 random bytes (for AES-GCM-256) and packaging them. I don’t think with a properly scaled SC this would produce more latency

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Valery Smyslov
Hi Rafa, sure this problem is general for any SDN solution. My point was that if SC performs a lot of real-time (or near real-time) tasks as it may happen in IKE-less case, then this problem may become serious. Anyway, I'm happy with the updated text, thank you. However, in a followin

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Susan Hares
Rafa and Yoav: [IDR co-chair hat on] and Caveat – I am not a IPSEC or security expert. >I don’t think it’s very useful for the controller to distribute a policy (SPD >entries) but no SAs (SAD entries) in the IKE-less case. It makes sense >in >the IKE case because the NSFs can then use

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Rafa Marin-Lopez
Hi Tero: > El 22 jul 2019, a las 16:52, Tero Kivinen escribió: > > Rafa Marin-Lopez writes: >> We submitted a new version of the I-D (v05) where we have applied several >> changes. In the following you have a summary of the main changes, which we >> will expand/explain during our presentation:

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Rafa Marin Lopez
Hi Yoav: > El 21 jul 2019, a las 3:23, Yoav Nir escribió: > > Hi, Valery > > [no hats] > > Thanks for that. > > I think this demonstrates that the current document is not enough and we will > need some follow-up documents explaining when to use either case. [Authors] The objective of the cu

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-22 Thread Rafa Marin Lopez
Hi Valery: Thank you very much for your comments. Please see ours inside. > El 20 jul 2019, a las 16:38, Valery Smyslov escribió: > > Hi, > > thank you for updating the document. I still think that some aspect > of IKE-less use case are not discussed yet (well, probably they are not > "seriou

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-21 Thread Valery Smyslov
Hi Yoav, Hi, Valery [no hats] Thanks for that. I think this demonstrates that the current document is not enough and we will need some follow-up documents explaining when to use either case. I don’t think it’s very useful for the controller to distribute a policy (SPD entries)

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-20 Thread Yoav Nir
Hi, Valery [no hats] Thanks for that. I think this demonstrates that the current document is not enough and we will need some follow-up documents explaining when to use either case. I don’t think it’s very useful for the controller to distribute a policy (SPD entries) but no SAs (SAD entries)

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-20 Thread Valery Smyslov
Hi, thank you for updating the document. I still think that some aspect of IKE-less use case are not discussed yet (well, probably they are not "serious", depending on one's definition of "serious"). Unlike IKE case. which we can consider as mostly static configuration, the IKE-less cas

Re: [IPsec] [I2nsf] I-D Action: draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt

2019-07-16 Thread Yoav Nir
Thanks for getting this done and published. We will wait with requesting publication until the I2NSF session next week. Between now and then, please re-read the draft and send a message to the list is something is seriously wrong. Barring any such shouting, we will request publication right af