{some of my emails have written "ABSR" rather than "ASBR". Oops}

Ben Schwartz <bem...@google.com> wrote:
    > On Mon, Oct 31, 2022 at 11:46 AM Michael Richardson 
<mcr+i...@sandelman.ca>
    > wrote:

    >>
    >> Michael Richardson <mcr+i...@sandelman.ca> wrote:
    >> > Based upon conversations on the list, this proposal might not even
    >> be IPsec.
    >> > At least, it's not proto=50(ESP)/51(AH), as they are asking for a new
    >> > extension header type.
    >>

    > Nit: RISAV in tunnel mode uses proto=50.  Only transport mode requests a
    > new protocol number.

And you'll add an outer IP header from ASBR to ASBR?
Since transport mode will not fit into 1500 bytes, and will violate RFC8200,
why even bother? :-)

    >> Even if you have the slimest possible pseudo-AH header, it will take at
    >> least
    >> a dozen bytes for the authentication data, which means at least 1520 byte
    >> packets or so.  None of them support >1500.
    >>

    > That's fine.  We don't need 1500+24 bytes.  We just need 1280+24 bytes, 
(or
    > 1280+73 in tunnel mode), so that the end-to-end MTU is IPv6-compliant.

Yes, but what if someone sends a 1500 byte packet?

    > If you think we need 1500 bytes of end-to-end MTU, I would be interested 
to
    > hear why.

Because every single network/service/etc. that doesn't support that gets into 
horrible MTU trouble.
I wish that wasn't true.  I've pushed hard for PLPMTU to be turned on by
default, but it's not happening.

    > I think I roughly understand the IP-TFS idea.  I think that IP-TFS would 
be
    > preferable if it is easy to deploy, but I worry that it's not practical,
    > for two reasons:

    > 1. Scalability and efficiency.  Compared to RISAV, IP-TFS would require

    > * a much larger number of IKEv2 handshakes (one for each pair of
    > communicating routers, vs. 1 for the whole AS pair)

I don't see why you conclude this.
IP-TFS would be the tunnel between the ABSRs.
There would be one IKEv2 handshake per-pair of ABSRs, I think.
I guess your diagram has these ACS devices which are going to do IKEv2, but I
don't really see how that's going to work at higher line speeds.  One chews
through keys very fast, as other drafts in the WG are trying to deal with.

    > * a larger amount of connection state (to hold all the different SAs)
    > * a much larger amount of IP buffer memory (for fragment reassembly)

How many fragments you have to reassembly is somewhat configurable.

    > * a somewhat larger amount of MTU overhead

For the gain that you don't cause users TCP connections to fail.

    > 2. Routing interference and configuration

    > RISAV-AH doesn't alter packet routing at all.  The source and dest IPs are
    > unchanged, so packets flow along exactly the same paths as they would
    > without RISAV.

Yes, it does that by violating RFC8200.
Please ask for 6man time for this.

    > RISAV in tunnel mode changes the destination IP to one IP for the whole
    > receiving AS, but that IP can be anycast across all ASBRs, so routing
    > should be similar to non-RISAV routing, and configuration is
    > straightforward.

    > IP-TFS requires each sending ASBR to pick a specific receiving ASBR.  This
    > creates a form of "source routing" that bypasses much of the usual BGP
    > pathfinding.

I don't see how anything else is going to work, unless you create something
that isn't IPsec.  I encourage you to do that.

    > Recreating the baseline routing paths could be difficult or
    > impossible, and might require O(N^2) active tunnels, for a pair of ASes
    > with N ASBRs each.  The simple RISAVAnnouncement that goes in the RPKI
    > database would have to be replaced by a much larger configuration object
    > that enumerates all the ASBRs and explains who should use which one.

    > You mentioned earlier that this form of "source routing" might be 
desirable
    > in some use cases.  That's an intriguing idea, but I would like for ASes 
to
    > be able to activate RISAV with a minimum of additional complexity,
    > maintenance, and risk.

Geoff Houston has a presentation about this.

--
Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-



Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to