[Last-Call] Re: [IPv6]Re: Genart last call review of draft-ietf-6man-vpn-dest-opt-01

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I concur with Ron while partly agreeing with Linda.

 

IPv6 Destination Options are typically meant for end-host processing”

Exactly! And in a VPN tunnel, the end-host is the end of the tunnel: the node identified by the packet’s destination address.

This may very well (erm, nearly always?) be a PE in the case of VPN tunnels.

 

Many IPv6 deployments drop packets with extension headers, particularly in transit networks.”

Indeed, and if they do this (and everything else that uses extension headers) will fail. I guess that includes SRv6 ;-)

 

There is a security risk of VPN boundaries being breached if an attacker injects a packet with a forged VPN Service Option.”

It’s almost as if the Security Considerations section should discuss this. Oh, wait!

The challenge of “tunnel security” is fundamental to all VPN deployments regardless of technology. The key solution has been two-fold

  1. Secure the network edges so that packets cannot enter the network and join the tunnel mid-way
  2. Use end-to-end security on the tunnel

 

“The document does not clearly explain why this approach is preferable to SRv6 or MPLS-over-IPv6”

Well, I think the second approach is covered by the note that the MPLS-based mechanism ‘cannot be deployed where one or both of the PEs does not support MPLS.’ That might not be the case with modern PE routers, but is likely to be the case with server-based PE implementations (such as virtual routers in a DC).

As to compare and contrast with SRv6: I refuse to get drawn into a beauty contest. But by making this draft Experimental, we allow for the possibility that no one will like this idea and it will not see any experimental results.

 

 

 

Ron – nit. Section 7 s/fo/of/

 

Cheers,

Adrian

 

 

From: Ron Bonica <rbonica=40juniper.net@xxxxxxxxxxxxxx>
Sent: 04 February 2025 17:37
To: gen-art@xxxxxxxx; Linda Dunbar <linda.dunbar@xxxxxxxxxxxxx>
Cc: draft-ietf-6man-vpn-dest-opt.all@xxxxxxxx; ipv6@xxxxxxxx; last-call@xxxxxxxx
Subject: [IPv6]Re: Genart last call review of draft-ietf-6man-vpn-dest-opt-01

 

Linda,

 

I think that you are assuming the PE's are always routers. They can be hosts that support VPN.

 

In fact, this is the most likely use-case. These days, most routers support MPLS. So, MPLS VPNs suffice.  There is no need for an alternative forwarding plane.

 

The only case where you need an alternative forwarding plane is when the PE is a server that doesn't support MPLS.

 

Also, the Destination Options Header is least likely to be dropped by an intervening network. If we were to follow the reasoning that you present below, we would have to deprecate all extension headers.

 

                              Ron

 

 

Juniper Business Use Only


From: Linda Dunbar via Datatracker <noreply@xxxxxxxx>
Sent: Tuesday, February 4, 2025 12:14 PM
To: gen-art@xxxxxxxx <gen-art@xxxxxxxx>
Cc: draft-ietf-6man-vpn-dest-opt.all@xxxxxxxx <draft-ietf-6man-vpn-dest-opt.all@xxxxxxxx>; ipv6@xxxxxxxx <ipv6@xxxxxxxx>; last-call@xxxxxxxx <last-call@xxxxxxxx>
Subject: Genart last call review of draft-ietf-6man-vpn-dest-opt-01

 

[External Email. Be cautious of content]


Reviewer: Linda Dunbar
Review result: Not Ready

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://urldefense.com/v3/__https://wiki.ietf.org/en/group/gen/GenArtFAQ__;!!NEt6yMaO-gk!BLykpJutCCzxKiIZjeHVdoB338VQZhpLkmdB5B4S_VdshlvRcmCmLJElE3_jegOw0G6IKgyNWQDToPU$ >.

Document: draft-ietf-6man-vpn-dest-opt-01
Reviewer: Linda Dunbar
Review Date: 2025-02-04
IETF LC End Date: 2025-02-04
IESG Telechat date: Not scheduled for a telechat

Summary: the document proposes an experiment to encode VPN service information
within an IPv6 Destination Option to facilitate VPN deployments

Major issues:
- IPv6 Destination Options are typically meant for end-host processing, not for
PE routers. Many IPv6 deployments drop packets with extension headers,
particularly in transit networks. The draft assumes that ingress and egress PE
routers will process the VPN Service Option, but if intermediate routers drop
these packets, the approach may fail in real-world deployments. - There is a
security risk of VPN boundaries being breached if an attacker injects a packet
with a forged VPN Service Option. - The document does not clearly explain why
this approach is preferable to SRv6 or MPLS-over-IPv6

Minor issues:

Nits/editorial comments:

Best Regards,
Linda Dunbar

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux