Hi rtgwg WG, Using VPN to connect resources of third-party cloud service provider is one typical provisioning method for operators to provide service to enterprises. This document links multiple individual IETF drafts, providing a holistic view of the potential mitigation approaches, I think the document is valuable to describe a comprehensive problem statement covering networking challenges that enterprises face when integrating existing VPN infrastructures with in third-party cloud data centers (Cloud DCs). it is especially useful for Telcom service providers, so I hope it can be published soon.
I also have minor suggestions to its authors, 1. Section 3.4 mentions "Network Issues for 5G Edge Clouds and Mitigation Methods", In our practices, Edge Clouds are also deployed in wireline metro network, not only 5G networks, so is it possible to expand the scope of this case? 2. Section 3.6 disucsses "NAT Practices for Accessing Cloud Services" I think IPv6 is the one approach, maybe the most fundermental one, to solve NAT issues for accessing cloud serivces, so can the authors add one sentence in this section? Best regards Chongfeng From: Yingzhen Qu Date: 2025-01-21 02:09 To: Linda Dunbar CC: rtgwg-chairs; rtgwg@ietf.org Subject: [rtgwg] Re: Request for Another Round of Directorate Review for draft-ietf-rtgwg-net2cloud-problem-statement Hi Linda, Let's allow the WG some time to review and comment on the latest version. Also please make sure you address the comments from the IESG reviews. A couple of examples below (not a complete list): https://mailarchive.ietf.org/arch/msg/rtgwg/zJpp9slvS6IcViOh5HQmVqwXmzQ/ https://mailarchive.ietf.org/arch/msg/rtgwg/XVkwbzg-OrdLlwTaFIxUIa3taiQ/ Thanks, Yingzhen On Fri, Jan 17, 2025 at 9:32 AM Linda Dunbar <linda.dun...@futurewei.com> wrote: Ying Zhen and Jeff, The IESG returned draft-ietf-rtgwg-net2cloud-problem-statement-41 to the working group for further review and revisions. The document has since been updated to address the comments raised during the IESG review: https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/ To ensure that the latest revision fully resolves the concerns raised, I would like to request another round of directorate review. This will help confirm that all feedback has been adequately addressed before proceeding further in the publication process. Please let me know if this can be arranged and if there are any additional steps required from my end. Thank you very much, Linda From: James Guichard <james.n.guich...@futurewei.com> Sent: Thursday, September 19, 2024 11:07 AM To: Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct <jmh.dir...@joelhalpern.com> Subject: Re: Net2cloud problem statement Yes, that is the whole point. The WG needs to have that discussion. However, I would talk with the chairs first to see how they want to handle it. Jim From: Linda Dunbar <linda.dun...@futurewei.com> Date: Thursday, September 19, 2024 at 2:06 PM To: James Guichard <james.n.guich...@futurewei.com>, jmh.direct <jmh.dir...@joelhalpern.com> Subject: RE: Net2cloud problem statement Jim, As the document is returned to the WG, is it okay for me to get feedback from the WG if the proposed resolutions can address your reasons for returning back to the WG? Linda From: James Guichard <james.n.guich...@futurewei.com> Sent: Thursday, September 19, 2024 11:00 AM To: Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct <jmh.dir...@joelhalpern.com> Subject: Re: Net2cloud problem statement I don’t think that is necessary as the document is no longer under IESG evaluation. Jim From: Linda Dunbar <linda.dun...@futurewei.com> Date: Thursday, September 19, 2024 at 1:59 PM To: James Guichard <james.n.guich...@futurewei.com>, jmh.direct <jmh.dir...@joelhalpern.com> Subject: RE: Net2cloud problem statement Jim, Should I still send the reply to John to show that his comments & suggestions are not ignored? Linda From: James Guichard <james.n.guich...@futurewei.com> Sent: Thursday, September 19, 2024 10:29 AM To: Linda Dunbar <linda.dun...@futurewei.com>; jmh.direct <jmh.dir...@joelhalpern.com> Subject: Re: Net2cloud problem statement Hi Linda, I have returned the document to the WG with comments. There are some fundamental issues that the WG needs to consider before trying to put the document through the IESG again. Thanks! Jim From: Linda Dunbar <linda.dun...@futurewei.com> Date: Thursday, September 19, 2024 at 1:27 PM To: James Guichard <james.n.guich...@futurewei.com>, jmh.direct <jmh.dir...@joelhalpern.com> Subject: RE: Net2cloud problem statement Jim, Thank you very much for the advice. Could you please review the following replies to ensure they adequately address John's comments and concerns? If not, I would appreciate any advice on how to better alleviate his concerns. Linda ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- Much of this document seems to be a high-level outline of particular commercial offerings, which among other problems, will not age well. Other parts outline challenges that are already solved, using existing IETF technologies or general remarks about best practices for operating networks. Yet other parts provide brief sketches of other SDOs' technologies or architectures. Overall, I don't think this is a valuable document for the IETF to be publishing as part of the RFC series, and as such I expect to eventually ballot Abstain. [Linda] This document is intended as an informational RFC, aimed at providing a comprehensive understanding of the challenges and mitigation methods (developed by IETF) for enterprises connecting their existing VPNs to cloud networks. While it acknowledges related work from other SDOs as references, its focus remains on addressing specific concerns within the IETF’s scope. The individual IETF solution drafts derived from this document focus on smaller, specific aspects of enterprise-cloud connectivity. However, this document links those aspects together, providing a holistic view of the entire problem space. I do, however, have a few concerns about the document which warrant a DISCUSSion, first. ## DISCUSS ### This isn't a requirements document; I think that should be made clearer Sometimes the IETF publishes requirements documents, which when issued as RFCs are seen as having some standing to establish that a given technology must be developed or advanced. The present document introduces itself as a problem statement document, but Section 6 is called "requirements". [Linda] Does remove the Section 6 (requirement section) address your concern? My concern arises because throughout the document there are pointers to places in the IETF (WGs, drafts) where there is work in progress. I would prefer to avoid any ambiguity down the road, as to whether these citations are just for the information of the reader as examples, or something more. I'm open to solutions, but perhaps something like this, as a final paragraph of the introduction? [Linda] The citations of IETF drafts throughout the document are intended purely for informational purposes, providing examples and context for the reader. NEW: This document provides references to IETF working groups and Internet Drafts that relate to the subject. These references are provided as examples and for the information of the reader, and should not be interpreted as requiring the adoption or implementation of any particular solution. Certain high-level requirements are presented in Section 6; these requirements are agnostic as to what solutions should fulfill them. [Linda] Thank you for the suggestion. We can add your proposed wording to Section 1 (Introduction) To be clear, my concern is that the document can easily be read as privileging a certain set of solutions. Those might be the best solutions, I don't know, but I don't think it is the place of a problem statement or requirements document to mandate solutions. [Linda] Do you think adding the following sentence to the Introduction section can address your concern? “While this document discusses potential mitigation practices, it does not aim to prescribe or mandate specific solutions; rather, it presents various options that may address the identified challenges, allowing further exploration and consideration of alternative approaches.” ### Inscrutable paragraph in Section 3.1 2. Section 3.1 includes the following paragraph: - A Cloud DC GW typically has multiple eBGP sessions with various clients and sets a route limit for each one. Therefore, on- premises data center gateways with eBGP sessions to the Cloud DC GW should configure default routes and filter out as many routes as possible, replacing them with a default route in their eBGP advertisements. This approach minimizes the number of routes exchanged with the Cloud DC eBGP peers. I simply can't understand what this paragraph is telling me to do. This would be partly remedied -- and the document improved overall -- if there were an earlier section providing a reference model and defining terms such as "Cloud DC GW", and illustrating the flow of routing information between elements. Since there is no such model, and since the prose quoted isn't clear, the reader is left to use their imagination, which is the opposite of what we strive for in our RFCs. I would suggest a rewrite but I can't discern even enough of your intent to offer one, I'm sorry. I guess my imagination has failed me. [Linda] Do you think the following rewrite is clearer? “-A Cloud DC GW typically establishes multiple eBGP sessions with many clients. Each session is configured with a maximum number of routes it can handle. To avoid exceeding this limit, which could lead to the Cloud DC GW dropping routes, on-premises data center gateways should simplify their route advertisements by filtering unnecessary routes and using a default route instead. This practice minimizes the volume of routing information exchanged between on-premises data centers and Cloud DCs, thereby preventing the unwanted dropping of routes when the configured maximum for a client is exceeded.” ### Section 3.2, no IGP As described in [RFC7938], a Cloud DC might not have an IGP to route around link/node failures within its domain. Are you saying that because there's no IGP the Cloud DC can't route around failures? Surely not, this is the opposite of what RFC 7938 describes. But it's sure what it sounds like. [Linda] no, the intent is to say that when IGP is not running, other methods are used by Cloud DC to detect the faults. How about changing the paragraph to the following? Old: “As described in [RFC7938], a Cloud DC might not have an IGP to route around link/node failures within its domain. When a site failure happens, the Cloud DC GW visible to clients is running fine; therefore, the site failure is not detectable by the clients using Bidirectional Forwarding Detection (BFD)[RFC5880].” New: “As described in [RFC7938], a Cloud DC may not run IGP within its domain, instead, it relies on internal methods to detect and report faults, which differ from standardized protocols like BFD or IGP. In the event of a site failure, while the Cloud DC GW visible to clients continues to operate normally, the failure remains undetected by clients relying on BFD [RFC5880]. Since BFD is not running within the Cloud DC, the GW cannot simply extend or concatenate BFD sessions to external peers.” When a site failure happens, the Cloud DC GW visible to clients is running fine; therefore, the site failure is not detectable by the clients using Bidirectional Forwarding Detection (BFD)[RFC5880]. This doesn't make any sense to me. Again, perhaps a reference model showing the relationship of a "Cloud DC GW", a "site", where BFD would be running, etc, might have helped. [Linda] are the above proposed new text more clear? ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- ## COMMENT ### Section 3.1, Capability Mismatch I don't understand what this means: Capability mismatch can cause BGP sessions not being adequately established. The "mitigation practices" basically amount to "follow the relevant standards". Is the quoted text trying to say something like "implementations that have bugs or don't follow the standards may not work right"? Generally, we don't need an RFC to say that, it's akin to the classic "MUST NOT write bugs". [Linda] (by the co-author from Azure:) Cloud DCs often peer with a significantly larger number of enterprises, some of which may lack sufficient BGP expertise. As a result, they frequently encounter BGP peering errors, including capability mismatches, unwanted route leaks, missing Keepalives, and session resets. Simply saying "follow IETF standards" is not enough. For example, when a Cloud GW receives inbound routes exceeding the maximum routes from a peer, the current practice is to generate out-of-band alerts (e.g., Syslog entries) via the management system or to terminate the BGP session. Those practices are not preferred. A more operation-friendly approach would be for peers to reduce the number of routes they are advertising, like "route threshold crossing" alert mechanism. ### Section 3.2, Huge number... problem When a site failure occurs, many services can be impacted. When the impacted services' IP prefixes in a Cloud DC are not aggregated nicely, which is common, one single site failure can trigger a huge number of BGP UPDATE messages. There are proposals, such as [METADATA-PATH], to enhance BGP advertisements to address this problem. Is there some supporting evidence that the O(N) nature of BGP convergence is a "problem" in this context? I mean, sure, O(1) is nicer than O(N), but there are many O(N) operations we choose not to optimize because they don't need optimizing. I haven't seen evidence presented that convinces me this needs optimizing. [Linda] It is more about huge number of BGP UPDATE messages triggered by a POD losing power or encountering fiber cut. Rather than debate this point, one possible way to address it would be to reword in some more factual way, such as, NEW: When a site failure occurs, many services can be impacted. When the impacted services' IP prefixes in a Cloud DC are not aggregated nicely, which is common, one single site failure can trigger multiple BGP UPDATE messages. There are proposals, such as [METADATA-PATH], to enhance BGP advertisements to reduce the number of messages required. [Linda] Thank you for the suggested wording. We can change per your suggestion. ### Section 3.4, UEs can move Here are some network problems with connecting to the services in the 5G Edge Clouds: ... 3) Source (UEs) can ingress from different LDN Ingress routers due to mobility. How is that a "problem"? [Linda] This is a routing problem when the ingress router changes for the same service. Do you think the following wording is better? “Due to user mobility, sources (UEs) can ingress from different LDN Ingress routers, presenting a routing challenge.” ### Section 6, IPSec requirement - Should support scalable IPsec key management among all nodes involved in DC interconnect schemes. But you don't say that it's a requirement for a solution to be IPSec-based at all. For a solution that isn't IPSec-based, this requirement is moot. Perhaps, NEW: - Should support scalable IPsec key management among all nodes involved in DC interconnect schemes, if IPSec is used as a VPN technology. [Linda] Thank you very much for the suggested wording. We will change per your suggestion. ### Section 6, AZ - Should support traffic steering to distribute loads across regions/AZs based on performance/availability of workloads in You've never defined "AZ". Please do, or remove. [Linda] AZ for Availability Zone. ### Section 7, anti-DDoS a) Potential DDoS (Distributed Denial of Service) attack to the ports facing the untrusted network (e.g., the public internet), which may propagate to the cloud edge resources. To mitigate such security risk, it is necessary for the ports facing internet to enable Anti-DDoS features. Can you be specific about what "anti-DDoS features" are? You make it sound as though there's some way to configure "port xyz1/2 no ddos" and the problem goes away. To my knowledge, such "anti-DDoS features" don't exist. If they do, please cite examples. If they don't, something about this needs to change; minimally, delete the "to mitigate" sentence. [Linda] Do you think adding the following detailed the Anti-DDoS practices would be sufficient? “There are many Anti-DDoS features to consider. Some examples include: Rate Limiting, Access Control Lists (ACLs), Deep Packet Inspection (DPI), Blackholing and Sinkholing (which route malicious traffic to a non-existent IP address or a system that safely absorbs or analyzes the traffic), Traffic Scrubbing, and Geo-IP Blocking. “ From: James Guichard <james.n.guich...@futurewei.com> Sent: Thursday, September 19, 2024 5:42 AM To: jmh.direct <jmh.dir...@joelhalpern.com> Cc: Linda Dunbar <linda.dun...@futurewei.com> Subject: Re: Net2cloud problem statement One further thing and this worried me when I did my review. I think that all requirements need to be taken out of the document and refocus it to problem statement only. Once all the reviews are in we should probably have a call to discuss. Jim From: James Guichard <james.n.guich...@futurewei.com> Date: Thursday, September 19, 2024 at 8:26 AM To: jmh.direct <jmh.dir...@joelhalpern.com> Cc: Linda Dunbar <linda.dun...@futurewei.com> Subject: Re: Net2cloud problem statement Hi Joel, I think he raises good points and in fact I raised the same during my review. I think if the authors provide some clarity on his DISCUSS points they should be able to overcome his objections. If he abstains because he does not the think the document is valuable then that is fine. Jim From: jmh.direct <jmh.dir...@joelhalpern.com> Date: Wednesday, September 18, 2024 at 10:38 PM To: James Guichard <james.n.guich...@futurewei.com> Cc: Linda Dunbar <linda.dun...@futurewei.com> Subject: Net2cloud problem statement I am not at all sure what to make of John and Pail's concerns. Suggestions? Tganks, Joel Sent via the Samsung Galaxy S20 FE 5G, an AT&T 5G smartphone
_______________________________________________ rtgwg mailing list -- rtgwg@ietf.org To unsubscribe send an email to rtgwg-le...@ietf.org