Hi Linda, Let's allow the WG some time to review and comment on the latest version.
Also please make sure you address the comments from the IESG reviews. A couple of examples below (not a complete list): https://mailarchive.ietf.org/arch/msg/rtgwg/zJpp9slvS6IcViOh5HQmVqwXmzQ/ https://mailarchive.ietf.org/arch/msg/rtgwg/XVkwbzg-OrdLlwTaFIxUIa3taiQ/ Thanks, Yingzhen On Fri, Jan 17, 2025 at 9:32 AM Linda Dunbar <linda.dun...@futurewei.com> wrote: > Ying Zhen and Jeff, > > The IESG returned *draft-ietf-rtgwg-net2cloud-problem-statement-41* to > the working group for further review and revisions. The document has since > been updated to address the comments raised during the IESG review: > https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/ > > To ensure that the latest revision fully resolves the concerns raised, I > would like to request another round of directorate review. This will help > confirm that all feedback has been adequately addressed before proceeding > further in the publication process. > > Please let me know if this can be arranged and if there are any additional > steps required from my end. > > Thank you very much, > > Linda > > > > > > *From:* James Guichard <james.n.guich...@futurewei.com> > *Sent:* Thursday, September 19, 2024 11:07 AM > *To:* Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject:* Re: Net2cloud problem statement > > > > Yes, that is the whole point. The WG needs to have that discussion. > However, I would talk with the chairs first to see how they want to handle > it. > > > > Jim > > > > *From: *Linda Dunbar <linda.dun...@futurewei.com> > *Date: *Thursday, September 19, 2024 at 2:06 PM > *To: *James Guichard <james.n.guich...@futurewei.com>, jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject: *RE: Net2cloud problem statement > > Jim, > > > > As the document is returned to the WG, is it okay for me to get feedback > from the WG if the proposed resolutions can address your reasons for > returning back to the WG? > > > > Linda > > > > *From:* James Guichard <james.n.guich...@futurewei.com> > *Sent:* Thursday, September 19, 2024 11:00 AM > *To:* Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject:* Re: Net2cloud problem statement > > > > I don’t think that is necessary as the document is no longer under IESG > evaluation. > > > > Jim > > > > *From: *Linda Dunbar <linda.dun...@futurewei.com> > *Date: *Thursday, September 19, 2024 at 1:59 PM > *To: *James Guichard <james.n.guich...@futurewei.com>, jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject: *RE: Net2cloud problem statement > > Jim, > > > > Should I still send the reply to John to show that his comments & > suggestions are not ignored? > > > > Linda > > > > *From:* James Guichard <james.n.guich...@futurewei.com> > *Sent:* Thursday, September 19, 2024 10:29 AM > *To:* Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject:* Re: Net2cloud problem statement > > > > Hi Linda, > > > > I have returned the document to the WG with comments. There are some > fundamental issues that the WG needs to consider before trying to put the > document through the IESG again. > > > > Thanks! > > > > Jim > > > > *From: *Linda Dunbar <linda.dun...@futurewei.com> > *Date: *Thursday, September 19, 2024 at 1:27 PM > *To: *James Guichard <james.n.guich...@futurewei.com>, jmh.direct < > jmh.dir...@joelhalpern.com> > *Subject: *RE: Net2cloud problem statement > > Jim, > > > > Thank you very much for the advice. > > > > Could you please review the following replies to ensure they adequately > address John's comments and concerns? If not, I would appreciate any advice > on how to better alleviate his concerns. > > > > Linda > > > > ---------------------------------------------------------------------- > > DISCUSS: > > ---------------------------------------------------------------------- > > > > Much of this document seems to be a high-level outline of particular > commercial > > offerings, which among other problems, will not age well. Other parts > outline > > challenges that are already solved, using existing IETF technologies or > general > > remarks about best practices for operating networks. Yet other parts > provide > > brief sketches of other SDOs' technologies or architectures. Overall, I > don't > > think this is a valuable document for the IETF to be publishing as part of > the > > RFC series, and as such I expect to eventually ballot Abstain. > > > > [Linda] This document is intended as an informational RFC, aimed at > providing a comprehensive understanding of the challenges and mitigation > methods (developed by IETF) for enterprises connecting their existing VPNs > to cloud networks. While it acknowledges related work from other SDOs as > references, its focus remains on addressing specific concerns within the > IETF’s scope. The individual IETF solution drafts derived from this > document focus on smaller, specific aspects of enterprise-cloud > connectivity. However, this document links those aspects together, > providing a holistic view of the entire problem space. > > > > > > I do, however, have a few concerns about the document which warrant a > > DISCUSSion, first. > > > > ## DISCUSS > > > > ### This isn't a requirements document; I think that should be made clearer > > > > > > Sometimes the IETF publishes requirements documents, which when issued as > RFCs > > are seen as having some standing to establish that a given technology must > be > > developed or advanced. The present document introduces itself as a problem > > statement document, but Section 6 is called "requirements". > > > > [Linda] Does remove the Section 6 (requirement section) address your > concern? > > > > My concern arises because throughout the document there are pointers to > places > > in the IETF (WGs, drafts) where there is work in progress. I would prefer > to > > avoid any ambiguity down the road, as to whether these citations are just > for > > the information of the reader as examples, or something more. I'm open to > > solutions, but perhaps something like this, as a final paragraph of the > > introduction? > > > > [Linda] The citations of IETF drafts throughout the document are intended > purely for informational purposes, providing examples and context for the > reader. > > > > > > NEW: > > This document provides references to IETF working groups and Internet > > Drafts that relate to the subject. These references are provided as > > examples and for the information of the reader, and should not be > > interpreted as requiring the adoption or implementation of any > > particular solution. Certain high-level requirements are presented > > in Section 6; these requirements are agnostic as to what solutions > > should fulfill them. > > [Linda] Thank you for the suggestion. We can add your proposed wording to > Section 1 (Introduction) > > > > > > To be clear, my concern is that the document can easily be read as > privileging > > a certain set of solutions. Those might be the best solutions, I don't > know, > > but I don't think it is the place of a problem statement or requirements > > document to mandate solutions. > > > > [Linda] Do you think adding the following sentence to the Introduction > section can address your concern? > > *“While this document discusses potential mitigation practices, it does > not aim to prescribe or mandate specific solutions; rather, it presents > various options that may address the identified challenges, allowing > further exploration and consideration of alternative approaches.”* > > > > ### Inscrutable paragraph in Section 3.1 > > > > 2. Section 3.1 includes the following paragraph: > > > > - A Cloud DC GW typically has multiple eBGP sessions with various > > clients and sets a route limit for each one. Therefore, on- > > premises data center gateways with eBGP sessions to the Cloud > > DC GW should configure default routes and filter out as many > > routes as possible, replacing them with a default route in > > their eBGP advertisements. This approach minimizes the number > > of routes exchanged with the Cloud DC eBGP peers. > > > > I simply can't understand what this paragraph is telling me to do. This > would > > be partly remedied -- and the document improved overall -- if there were an > > earlier section providing a reference model and defining terms such as > "Cloud > > DC GW", and illustrating the flow of routing information between elements. > > Since there is no such model, and since the prose quoted isn't clear, the > > reader is left to use their imagination, which is the opposite of what we > > strive for in our RFCs. > > > > I would suggest a rewrite but I can't discern even enough of your intent to > > offer one, I'm sorry. I guess my imagination has failed me. > > > > [Linda] Do you think the following rewrite is clearer? > > > > *“-A Cloud DC GW typically establishes multiple eBGP sessions with many > clients. Each session is configured with a maximum number of routes it can > handle. To avoid exceeding this limit, which could lead to the Cloud DC GW > dropping routes, on-premises data center gateways should simplify their > route advertisements by filtering unnecessary routes and using a default > route instead. This practice minimizes the volume of routing information > exchanged between on-premises data centers and Cloud DCs, thereby > preventing the unwanted dropping of routes when the configured maximum for > a client is exceeded.”* > > > > ### Section 3.2, no IGP > > > > As described in [RFC7938], a Cloud DC might not have an IGP to route > > around link/node failures within its domain. > > > > Are you saying that because there's no IGP the Cloud DC can't route around > > failures? Surely not, this is the opposite of what RFC 7938 describes. But > it's > > sure what it sounds like. > > > > [Linda] no, the intent is to say that when IGP is not running, other > methods are used by Cloud DC to detect the faults. > > > > How about changing the paragraph to the following? > > > > Old: > > “As described in [RFC7938], a Cloud DC might not have an IGP to route > around link/node failures within its domain. When a site failure happens, > the Cloud DC GW visible to clients is running fine; therefore, the site > failure is not detectable by the clients using Bidirectional Forwarding > Detection (BFD)[RFC5880].” > > > > New: > > *“As described in [RFC7938], a Cloud DC may not run IGP within its domain, > instead, it* *relies on internal methods to detect and report faults, > which differ from standardized protocols like BFD or IGP. In the event of a > site failure, while the Cloud DC GW visible to clients continues to operate > normally, the failure remains undetected by clients relying on BFD > [RFC5880]. Since BFD is not running within the Cloud DC, the GW cannot > simply extend or concatenate BFD sessions to external peers.”* > > > > > > > > When a site failure > > happens, the Cloud DC GW visible to clients is running fine; > > therefore, the site failure is not detectable by the clients using > > Bidirectional Forwarding Detection (BFD)[RFC5880]. > > > > This doesn't make any sense to me. Again, perhaps a reference model > showing the > > relationship of a "Cloud DC GW", a "site", where BFD would be running, etc, > > might have helped. > > > > [Linda] are the above proposed new text more clear? > > > > ---------------------------------------------------------------------- > > COMMENT: > > ---------------------------------------------------------------------- > > > > ## COMMENT > > > > ### Section 3.1, Capability Mismatch > > > > I don't understand what this means: > > > > Capability > > mismatch can cause BGP sessions not being adequately established. > > > > The "mitigation practices" basically amount to "follow the relevant > standards". > > Is the quoted text trying to say something like "implementations that have > bugs > > or don't follow the standards may not work right"? Generally, we don't > need an > > RFC to say that, it's akin to the classic "MUST NOT write bugs". > > > > [Linda] (by the co-author from Azure:) Cloud DCs often peer with a > significantly larger number of enterprises, some of which may lack > sufficient BGP expertise. As a result, they frequently encounter BGP > peering errors, including capability mismatches, unwanted route leaks, > missing Keepalives, and session resets. Simply saying "follow IETF > standards" is not enough. For example, when a Cloud GW receives inbound > routes exceeding the maximum routes from a peer, the current practice is to > generate out-of-band alerts (e.g., Syslog entries) via the management > system or to terminate the BGP session. Those practices are not preferred. > A more operation-friendly approach would be for peers to reduce the number > of routes they are advertising, like "route threshold crossing" alert > mechanism. > > > > > > ### Section 3.2, Huge number... problem > > > > When a site failure occurs, many services can be impacted. When the > > impacted services' IP prefixes in a Cloud DC are not aggregated > > nicely, which is common, one single site failure can trigger a huge > > number of BGP UPDATE messages. There are proposals, such as > > [METADATA-PATH], to enhance BGP advertisements to address this > > problem. > > > > Is there some supporting evidence that the O(N) nature of BGP convergence > is a > > "problem" in this context? I mean, sure, O(1) is nicer than O(N), but > there are > > many O(N) operations we choose not to optimize because they don't need > > optimizing. I haven't seen evidence presented that convinces me this needs > > optimizing. > > > > [Linda] It is more about huge number of BGP UPDATE messages triggered by a > POD losing power or encountering fiber cut. > > > > Rather than debate this point, one possible way to address it would be to > > reword in some more factual way, such as, > > > > NEW: > > When a site failure occurs, many services can be impacted. When the > > impacted services' IP prefixes in a Cloud DC are not aggregated > > nicely, which is common, one single site failure can trigger multiple > > BGP UPDATE messages. There are proposals, such as > > [METADATA-PATH], to enhance BGP advertisements to reduce the number > > of messages required. > > > > [Linda] Thank you for the suggested wording. We can change per your > suggestion. > > > > > > ### Section 3.4, UEs can move > > > > Here are some network problems with connecting to the services in > > the 5G Edge Clouds: > > ... > > 3) Source (UEs) can ingress from different LDN Ingress routers > > due to mobility. > > > > How is that a "problem"? > > > > [Linda] This is a routing problem when the ingress router changes for the > same service. Do you think the following wording is better? > > *“Due to user mobility, sources (UEs) can ingress from different LDN > Ingress routers, presenting a routing challenge.”* > > > > ### Section 6, IPSec requirement > > > > - Should support scalable IPsec key management among all nodes > > involved in DC interconnect schemes. > > > > But you don't say that it's a requirement for a solution to be IPSec-based > at > > all. For a solution that isn't IPSec-based, this requirement is moot. > Perhaps, > > > > NEW: > > - Should support scalable IPsec key management among all nodes > > involved in DC interconnect schemes, if IPSec is used as > > a VPN technology. > > > > [Linda] Thank you very much for the suggested wording. We will change per > your suggestion. > > > > > > ### Section 6, AZ > > > > - Should support traffic steering to distribute loads across > > regions/AZs based on performance/availability of workloads in > > > > You've never defined "AZ". Please do, or remove. > > > > [Linda] AZ for Availability Zone. > > > > > > ### Section 7, anti-DDoS > > > > a) Potential DDoS (Distributed Denial of Service) attack to the > > ports facing the untrusted network (e.g., the public internet), > > which may propagate to the cloud edge resources. To mitigate > > such security risk, it is necessary for the ports facing > > internet to enable Anti-DDoS features. > > > > Can you be specific about what "anti-DDoS features" are? You make it sound > as > > though there's some way to configure "port xyz1/2 no ddos" and the problem > goes > > away. To my knowledge, such "anti-DDoS features" don't exist. If they do, > > please cite examples. If they don't, something about this needs to change; > > minimally, delete the "to mitigate" sentence. > > > > [Linda] Do you think adding the following detailed the Anti-DDoS practices > would be sufficient? > > *“There are many Anti-DDoS features to consider. Some examples include: > Rate Limiting, Access Control Lists (ACLs), Deep Packet Inspection (DPI), > Blackholing and Sinkholing (which route malicious traffic to a non-existent > IP address or a system that safely absorbs or analyzes the traffic), > Traffic Scrubbing, and Geo-IP Blocking. “* > > > > > > > > *From:* James Guichard <james.n.guich...@futurewei.com> > *Sent:* Thursday, September 19, 2024 5:42 AM > *To:* jmh.direct <jmh.dir...@joelhalpern.com> > *Cc:* Linda Dunbar <linda.dun...@futurewei.com> > *Subject:* Re: Net2cloud problem statement > > > > One further thing and this worried me when I did my review. I think that > all requirements need to be taken out of the document and refocus it to > problem statement only. Once all the reviews are in we should probably have > a call to discuss. > > > > Jim > > > > *From: *James Guichard <james.n.guich...@futurewei.com> > *Date: *Thursday, September 19, 2024 at 8:26 AM > *To: *jmh.direct <jmh.dir...@joelhalpern.com> > *Cc: *Linda Dunbar <linda.dun...@futurewei.com> > *Subject: *Re: Net2cloud problem statement > > Hi Joel, > > > > I think he raises good points and in fact I raised the same during my > review. I think if the authors provide some clarity on his DISCUSS points > they should be able to overcome his objections. If he abstains because he > does not the think the document is valuable then that is fine. > > > > Jim > > > > *From: *jmh.direct <jmh.dir...@joelhalpern.com> > *Date: *Wednesday, September 18, 2024 at 10:38 PM > *To: *James Guichard <james.n.guich...@futurewei.com> > *Cc: *Linda Dunbar <linda.dun...@futurewei.com> > *Subject: *Net2cloud problem statement > > I am not at all sure what to make of John and Pail's concerns. > Suggestions? > > Tganks, > > Joel > > > > > > > > Sent via the Samsung Galaxy S20 FE 5G, an AT&T 5G smartphone > > >
_______________________________________________ rtgwg mailing list -- rtgwg@ietf.org To unsubscribe send an email to rtgwg-le...@ietf.org