Following up is going to be difficult due to the time of the year, but..

On Thu, 18 Dec 2008, Eric Rosen wrote:
My main concern here is with the O&M implication of dynamically
created and used softwires, which do not run any routing protocol and
there is no IETF protocol or management framework which could be used
to verify the correct operation of these tunnels.

In fact, we have over a  decade of experience with softwires, implemented as
MPLS  tunnels.   We  also  have  many years  of  experience  with  softwires
implemented as L2TPv3  tunnels, and I believe there  are also deployments of
softwires implemented as  GRE tunnels.  So it's a little  late to claim that
these constructs pose insuperable management difficulties.

All that's really  new here is that the framework  for signaling the tunnels
and for determining which packets get  tunneled has been stated in a general
way,  and the  use  of softwires  is discussed  in  the context  of a  v6/v4
Internet, rather than in the context of L3VPN.

The  application of  OAM to  softwires (particularly  when realized  as MPLS
LSPs) has been quite extensively discussed  over the years and I don't think
anything new needs to be mandated by the framework document.

I did not say these problems are insurmountable. The problems can be addressed by each operator deploying their own solution that addresses at least some of this. but these problems are not addressed in the IETF framework. We're creating a solution that is more fragile than status quo (a network which has not deployed MPLS and/or L2TPv3 for similar purpose) and IETF is doing disservice to the community if it doesn't clearly describe these problems (not done currently) and provide solutions to them.

It would be interesting to get more references on L2TPv3 deployments, but I don't consider MPLS a very good comparison point here; the charter looks for IPx over IPy solution, as does the problem statement; it would seem to be that the MPLS-specific parts of this framework are redundant. For similar reasons, MPLS OAM techniques (such as LSP ping) are not AFAIK applicable here as the softwires framework is targeting non-MPLS deployments.

In S 5 (this is also bordering on architectural issue):

       This leads to the following softwires deployment
       restriction:  if a BGP Capability is defined for the case
       in which an E-IP NLRI has an I-IP NH, all the AFBRs in a
       given transit core MUST advertise that capability.

... is there any way an implementation could verify if this deployment
restriction holds or not?

I don't think a service provider with an I-IP core would start offering E-IP
transit service unless all its  AFBRs were capable of providing the service.
This not only includes having the appropriate BGP capabilities, but also the
appropriate  hardware/software  capabilities  to  do the  encapsulation  and
decapsulation,  support for E-IP  and I-IP  on appropriate  interfaces, etc.
One could imagine configuring  the BGP speakers (including route reflectors)
so that IBGP connections are not  accepted unless some particular set of BGP
capabilities are advertised, but that's  only one small piece of the overall
set of deployment requirements.

This does not help much in preventing misconfigurations. For example, the document might say that the BGP Capability MUST NOT be advertised unless manually configured to do so (so that if an implementation would support this but the operator does not want to use it, it wouldn't be used). This still would not detect partial-mesh misconfigurations (I guess this would be similar to non-full ibgp mesh), but would reduce unintended effects.

At some point, a client might want to upgrade to dual stack.  Then,
client-interface may use both E-IP and I-IP.  This solution should be
applicable then as well

Depending on policy, one might or might not want to do, e.g., v6/v6 or v4/v4
encapsulation.  However, covering these cases is not within the scope of the
WG charter.

I was not referring to v6/v6 or v4/v4 encapsulation. If a client upgrades from v4-only to dual-stack, does it need to switch provider to be able to use v6, or would v6 traffic be dropped on the floor?

Obviously this should not be the case, but the framework does not say so. I believe it should, even if it is trivial. For example, enabling this method for v4 E-IP must not prevent the ISP from also providing v6 E-IP (without tunneling) to the user.

I.e., the longest-prefix matching is no longer sufficient with
softwires (i.e.: when deciding whether a packet to a particular E-IP
destination prefix should be tunneled through a softwire or forwarded
natively).

I'm  not  sure what  made  you think  that  longest-prefix  matching is  not
sufficient.

I was trying to figure out how 'show ip route [prefix]' or similar for an E-IP prefix would look like at an AFBR router, and I couldn't figure out how BGP could populate the routes in RIB without any softwire-specific mechanism, and conclused that the text in S 7 and later on policy referred to this.

If you'd implement this with longest-prefix matching, but with modifications to BGP, what I guess could happen is that for a BGP message for an E-IP prefix, the system where this is configured would need to install the E-IP prefix to RIB, change the next-hop to to be a dynamically created point-to-point tunnel interface. This next-hop would only be changed for "softwire-enabled" BGP sessions. Each BGP I-IP nexthop would be associated with its own unnumbered tunnel interface. Or it could point to a pseudo-tunnel interface, which would have a separate routing table where it looked up where to tunnel packets.

If above kind of operation is assumed, instead of talking about policy etc., some text on what's actually going on, even if non-normative, would help the reader grasp the content of what needs to happen and which mechanisms require modification in the process.

missing standardization [in the area of tunneling multicasts]

In the unicast  area, most of the technology  needed is already standardized
or in LC,  hence the framework document makes  normative references.  In the
multicast area, the situation is  different, and the framework document lays
out options without making normative references to specified technology.

I'd say this is a problem; the problem statement calls rather strongly for the solution to support multicast, and it currently does not do so.

Have  these  two   things  [BGP  next  hop  resolution   and  stacking  of
encapsulations] been specified somewhere?  This calls for a reference.

I think "recursive route resolution" and "stacking encapsulations" are "terms
of the art" which do not need  to be defined in this document, but for which
there is not a standard reference.

Did you mean "do not need", because 'but' seems strange here (with this phrasing, I'd have expected 'and')? Nonetheless, I'd still say more specific text is needed, at the minimum clearly naming what is required and how to interoperate it.

.. I believe this could result in two kinds of attacks which could be
emphasized better (more below)  Above uses "policy violations" which
may be read to refer to a policy described in Section 7.  For example,
the focus of the second quoted sentence is odd -- and makes this seem like
an issue in transmitting endpoints while to me the major issue seems to be
unauthorized endpoints.

The  problem  referred  to  is  that if  unauthorized  nodes  masquerade  as
authorized  transmitting endpoints,  there may  be  a way  to side-step  the
authorized policies.  I'm not quite sure what you are objecting to here.

It seems to be emphasizing the wrong thing -- that different kinds of packets may or may not be encapsulated by authorized endpoints, and that unauthorized endpoints are not bound to these policies. The problem is the unauthorized endpoints, the policy (or lack thereof) of authorized endpoints doesn't really matter, because even if it didn't exist, we could think of various kinds of packets sent by unauthorized endpoints that would need to be blocked. The key point here is analyzing how to prevent unauthorized endpoints and what kind of impact failing to do so would cause.

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to