Linda,
Thanks for all the work you're putting into this document. And thanks to the
reviewers for their contributions to making this a better draft.
It is certainly much more readable and that makes it a lot easier to work
out what is going on.
I have some small comments questions:
---
The text says, ".this document proposes". Given that the intention is that
ends up as a Standards Track RFC, the "proposal" is too weak. Probably,
"this document describes".
Similarly, s/of the proposed strategies/of the strategies/
---
I think it would be helpful to include a before and after view of the
tunnelling/encapsulation of packets. Maybe it's just me, but I had to work a
bit to put it together.
A. Before
Segment-segment IP-Sec
E2E IP payload
B. After
Segment-segment IP
Segment-segment Geneve
E2E IP-Sec
E2E IP payload
If I have that right, including some form of representation would be good.
If I have it wrong then it seems pretty important to correct me in the
document!
---
Section 3.3 bravely calls out TE as being a problem where the client (e.g.,
the SD-WAN CPEs) cannot influence the path within the server network. You
say, "In SD-WAN deployments where on-premises CPEs connect to Cloud GWs over
the public internet, traffic forwarding is typically destination-based,
limiting the ability to enforce precise traffic steering policies."
I agree with this, wholeheartedly.
However, the solution described in this document doesn't really solve that
problem. Yes, it allows the construction of an "overlay" network consisting
of CPEs and GWs connected via the cloud backbone. But that is just a
high-level steering technique, not "precise traffic steering policies." You
are still unable to control how the underlay network traffic engineers the
tunnels between nodes in the overlay.
For that matter, and related to the previous point on encapsulation, it
would be really helpful to represent this whole discussion in terms of an
overlay. (I'm reminded of the multi-segment pseudowire discussion!).
---
Somewhere between sections 9 and 10 we seem to be missing a discussion of
the distribution of keys between CPEs and GWs, and between GWs. This might
just be a back reference to section 7.
---
But I was confused by the content of section 7.2. This seems to talk about
IPsec tunnels between CPEs and GWs. I thought that the point of this
document was to make the IPsec tunnels E2E (i.e., CPE-CPE) and to not
involve the GWs in decrypt/re-encrypt.
---
The formatting for the header of 7.2 is broken in the ASCII version.
---
I should have thought (possibly in sections 9 and 10) that ACLs are pretty
fundamental building blocks to security. That is, you are allowing packets
to be tunnelled from one domain to another, where the tunnel is terminated
and the content is processed. Obviously, the authentication on the
decapsulated packet is important, but it is also expensive, making it a DoS
vector. Just like for other tunnels into the mid-point of a network, ACLs
provide a simple first line of defence.
Cheers,
Adrian
From: Linda Dunbar <[email protected]>
Sent: 11 August 2025 22:23
To: Joel Halpern <[email protected]>; Joel Halpern
<[email protected]>
Cc: rtgwg <[email protected]>; Adrian Farrel <[email protected]>; Jon Geater
<[email protected]>
Subject: RE: [rtgwg] Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir
review
Here is the link to the revision:
https://datatracker.ietf.org/doc/draft-ietf-rtgwg-multisegment-sdwan/
Linda
From: Linda Dunbar
Sent: Monday, August 11, 2025 2:23 PM
To: 'Joel Halpern' <[email protected]
<mailto:[email protected]> >; Joel Halpern <[email protected]
<mailto:[email protected]> >
Cc: rtgwg <[email protected] <mailto:[email protected]> >; Adrian Farrel
<[email protected] <mailto:[email protected]> >; 'Jon Geater'
<[email protected] <mailto:[email protected]> >
Subject: RE: [rtgwg] Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir
review
Joel,
The revision has been uploaded.
Also included the resolution to SecDir Jon Greater's comments.
Please let us know if the document is ready.
Thank you very much,
Linda
From: Joel Halpern <[email protected]
<mailto:[email protected]> >
Sent: Thursday, August 7, 2025 3:58 PM
To: Linda Dunbar <[email protected]
<mailto:[email protected]> >; Joel Halpern <[email protected]
<mailto:[email protected]> >
Cc: rtgwg <[email protected] <mailto:[email protected]> >; Adrian Farrel
<[email protected] <mailto:[email protected]> >
Subject: Re: [rtgwg] Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir
review
Two small points:
1) The region identification has to be the UTF-8 name of the region. If the
cloud provier uses numbers, then use the UTF-8 encoding of whatever
representation they use for those numbers. Do not try to allow a numeric
value. It will just complicate processing for no benefit.\
2) Once you have this done, make sure the description of the Exclude Region
TLV content use the same encoding.
Yours,
Joel
On 8/7/2025 6:51 PM, Linda Dunbar wrote:
Joel,
Thank you very much for attending the zoom call with Google's Ashok and
Oracle's Kausik to clarify the detailed requirements for Include - Regions
for Cloud Backbone Transit. The More accurate name should be Restricted
Region List.
Here is the revised section for the Restricted Region. If it is Okay with
you, we will add it back to -06:
Linda
--------------------------------
4.5 Restricted Regions Sub-TLV
Some enterprises may require that traffic across the Cloud Backbone is
strictly confined to a specific set of regions. This Sub-TLV allows the
ingress SD-WAN CPE to express such restrictions as part of the encapsulation
metadata.
Traffic MUST be discarded if the Ingress Gateway, the Egress Gateway, or any
transit node belongs to a region not listed in this Sub-TLV.
This restriction is commonly used to enforce regulatory, security, or
latency-based geographic constraints, where data must remain confined to
specified regions.
Format of the Restricted Regions Sub-TLV:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type (=4) | Length | Reserved (16 bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Region Len | Region ID or UTF-8 encoding of Region Name |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Region Len | Region ID or UTF-8 encoding of Region Name |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1. Type(8 bits): Assigned value identifying the Restricted Regions Sub-TLV.
Suggested value: 4.
2. Length (8 bits): Total length of the Value field (everything after the
Type and Length fields), in octets.
3. Reserved (16 bits): Reserved for future use. MUST be set to zero and
ignored on receipt.
4. Region Len (8 bits per region entry): Length of the region identifier or
UTF-8 name, in octets.
5. Region ID or UTF-8 encoding of the Region Name: Variable-length region
identifier. Can be a numeric Region ID or a UTF-8-encoded string (e.g.,
"us-west", "eu-central").
Multiple regions MAY be present, each starting with its own Region Len
field.
Processing notes:
6. Receiving Cloud Gateway MUST check whether it and all intermediate
transit regions are included in the listed regions.
7. If any component of the path falls outside the listed regions, the
packet MUST be discarded.
8. Region interpretation is based on prior agreement between the enterprise
and the Cloud Backbone provider (e.g., standard region names,
operator-specific definitions, or standardized Region IDs).
Note:
It is beyond the scope of this document to specify how the Cloud Backbone
enforces this restriction. Mechanisms for identifying region boundaries,
enforcing region-based constraints, and generating alerts or alarm
notifications when traffic violates region restrictions are subject to
implementation decisions and based on prior agreement between the Cloud
Backbone provider and the enterprise.
From: Linda Dunbar
Sent: Monday, August 4, 2025 1:02 PM
To: Joel Halpern <mailto:[email protected]> <[email protected]>
Subject: RE: [rtgwg] Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir
review
Joel,
Thank you!
How about this revision?
(^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^)
( Cloud Backbone )
(+-----+ +----+ +-----+)
+ ---(|CEdge|==| GW1==================== GW2 |)
Direct | (+-----+ +/--\+ +--|--+)
Connect | (^^^^^^^^/^^^^\^^^^^^^^^^^^^^^^^^^^^|^^^)
{-+---} / \ |
{ VPN } / \ +-----+
{-+---} / IPsec Tunnel |CPE10|
+-------+--/--------+ \ +-----+
| / | \ 192.0.2.128/25
++/--+ | +--\-+ 198.51.100.128/25
|CPE1| +--+CPE2|
+----+ +----+
Client Route: 192.0.2.0/26 192.0.2.64/26
198.51.100.0/26 198.51.100.64/26
Figure 2 Multi-Segment SD-WAN Stitching via Cloud Backbone
Linda
From: Joel Halpern <[email protected] <mailto:[email protected]> >
Sent: Sunday, August 3, 2025 7:08 AM
To: Linda Dunbar <[email protected]
<mailto:[email protected]> >
Subject: Re: [rtgwg] Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir
review
Just for your consideration.
As an example of additional tuning, I think figure 2 could be significantly
clarified. If I understand you properly, the cloud is actually the
connection between GW1 and GW2. So put GW on the left hand side of the
cloud, make the cloud a little larger, and put GW2 on the right hand side of
the cloud.
Yours,
Joel
On 8/1/2025 6:42 PM, Linda Dunbar wrote:
Joel,
Thank you very much for the call, making me understand where the confusion
is.
Do you think the following revision of the Abstract and the Introduction can
make it clear? Also, we probably should remove the "Include-Sub-TLV" for
now as there are so many issues.
Abstract
This document describes a method for seamlessly interconnecting
geographically separated SD-WAN segments via a Cloud Backbone without
requiring Cloud Gateways (GWs) to decrypt and re-encrypt traffic. By
encapsulating IPsec-encrypted payloads within GENEVE headers (RFC 8926), the
approach enables Cloud GWs to forward encrypted traffic directly between
distant Customer Premises Equipment (CPEs). This reduces processing
overhead, improves scalability, and preserves the confidentiality of
enterprise data while ensuring secure and efficient multi-segment SD-WAN.
connectivity.
1. Introduction
Enterprises are increasingly turning to SD-WAN to connect on-premises CPEs
with cloud services, as discussed in detail in [Net2Cloud]. Each SD-WAN
segment typically connects a CPE to its nearest Cloud Gateway (GW). Some of
this traffic terminates at the cloud services and must be decrypted by the
Cloud GW. Other traffic is destined for remote CPEs located in different
geographic regions and only require forwarding across a Cloud Backbone,
without decryption.
Multi-segment SD-WAN refers to the architecture in which two or more SD-WAN
segments are interconnected via a Cloud Backbone. This model enables traffic
that originates in one SD-WAN segment to reach a distant CPE through transit
Cloud GWs without decryption. It supports hybrid traffic handling: local
cloud-bound traffic is decrypted by the Cloud GW, while CPE-to-CPE traffic
is forwarded securely across the backbone.
Linda
From: Joel Halpern <mailto:[email protected]>
<[email protected]>
Sent: Thursday, July 31, 2025 1:51 PM
To: Linda Dunbar <mailto:[email protected]>
<[email protected]>; [email protected] <mailto:[email protected]>
Cc: [email protected]
<mailto:[email protected]> ; [email protected]
<mailto:[email protected]>
Subject: Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir review
In line, marked <jmh3></jmh3>. Given that I am still confused on these
issues, I suspect even if you end up keeping the behaviors as they are,
better explanation is needed.
Yours,
Joel
On 7/31/2025 4:29 PM, Linda Dunbar wrote:
Joel,
Thank for the reply.
Below are the additional resolutions marked as [Linda3] . Please let me know
if they are acceptable.
Thank you,
Linda
From: Joel Halpern <mailto:[email protected]> <[email protected]>
Sent: Wednesday, July 30, 2025 7:38 AM
To: Linda Dunbar <mailto:[email protected]>
<[email protected]>; Joel Halpern <mailto:[email protected]>
<[email protected]>; [email protected] <mailto:[email protected]>
Cc: [email protected]
<mailto:[email protected]> ; [email protected]
<mailto:[email protected]>
Subject: Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir review
Trimmed to remove agreements. Context retained for remaining issues. My
new notes marked <jmh2></jmh2>
Yours,
Joel
On 7/29/2025 10:25 PM, Linda Dunbar wrote:
Joel,
Apologies for missing this email through the IETF week.
Thank you very much for the additional comments. Please see below under
[Linda 2] for the proposed resolutions. Let us know if they are
acceptable.
Linda
From: Joel Halpern <mailto:[email protected]> <[email protected]>
Sent: Thursday, July 17, 2025 6:50 PM
To: Linda Dunbar <mailto:[email protected]>
<[email protected]>; [email protected] <mailto:[email protected]>
Cc: [email protected]
<mailto:[email protected]> ; [email protected]
<mailto:[email protected]>
Subject: Re: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir review
Some of your answers address the raised concerns. However, some of them
indicate I was insufficiently clear, as they do not address the issue. I
will not in line where things are fine,a nd where I think there is still a
problem. I will delimit my comments with <jmh></jmh> in case of indenting
problems.
Yours,
Joel
On 7/17/2025 9:12 PM, Linda Dunbar wrote:
Joel,
Thank you very much for reviewing the document and the valuable feedback.
Please see below for the detailed resolutions.
If they are okay with you, we can upload the revision on Monday.
Linda
-----Original Message-----
From: Joel Halpern via Datatracker <mailto:[email protected]>
<[email protected]>
Sent: Thursday, July 17, 2025 10:46 AM
To: [email protected] <mailto:[email protected]>
Cc: [email protected]
<mailto:[email protected]> ; [email protected]
<mailto:[email protected]>
Subject: draft-ietf-rtgwg-multisegment-sdwan-04 early Rtgdir review
Document: draft-ietf-rtgwg-multisegment-sdwan
Title: Multi-segment SD-WAN via Cloud DCs
Reviewer: Joel Halpern
Review result: Not Ready
Hello
I have been selected to do a routing directorate "early" review of this
draft.
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracke
r.ietf.org%2Fdoc%2Fdraft-ietf-rtgwg-multisegment-sdwan%2F
<https://datatracker.ietf.org/doc/draft-ietf-rtgwg-multisegment-sdwan/>
&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cde59685e54d84193978008ddc559b
e0d%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638883711415554778%7CUnknow
n%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIs
IkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=0rGQhV01eJsDerr6g1jxCzUI
khF5vlwTPOohcWDo3%2Bg%3D&reserved=0
The routing directorate will, on request from the working group chair,
perform an "early" review of a draft before it is submitted for publication
to the IESG. The early review can be performed at any time during the
draft's lifetime as a working group document. The purpose of the early
review depends on the stage that the document has reached.
This draft describes the extensions to Geneve to enable using it to
interconnect multiple SD-WAN segments, with particular attention to the case
when the carried payload is IPSec protected.
For more information about the Routing Directorate, please see
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwiki.ietf.
org%2Fen%2Fgroup%2Frtg%2FRtgDir <https://wiki.ietf.org/en/group/rtg/RtgDir>
&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cde59685e54d84193978008ddc559b
e0d%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638883711415582636%7CUnknow
n%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIs
IkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=rne%2Fx6T0XCvkiaZPqAx%2F
6%2BWGFFOY7%2FXs9tPq%2BmBi5G4%3D&reserved=0
Document: draft-ietf-rtgwg-multisegment-sdwan-04
Reviewer: Joel Halpern
Review Date: 17-July-2025
Intended Status: Proposed Standard
Summary:
I have some minor concerns about this document that I think should be
resolved before it is submitted to the IESG. I also have one major concern
that was flagged by I-D nits <jmh2>resolved</jmh2>. And one major concern
where a procedural element does nto sem to work.
...
Section 4.5 on including specific SD-WAN transitsegments eems an
understandable goal. However, it also seems fraught with failure
potential. In simple topologies, yes, it works. But suppose that the
actual path to the destination is SD-WAN segments A-B-C-D-E. And
suppose
the include requirement says "B". When the GENEVE packet arrives at the
C-D boundary, it says that its path must include B. But the path to the
destination from there does not include B. How is the C-D boundary
supposed to know that B has alreay been traversed?
[Linda] Some SD-WAN deployments require specific transit segments to be
included in the end-to-end path for regulatory, security, or service
chaining purposes, rather than for path optimization. The Include-Transit
Sub-TLV, an optional field, is used to signal such requirements. It allows
explicitly specifying a list of Cloud Availability Regions or Zones that a
packet must traverse when forwarded through the Cloud Backbone.
<jmh> I apparently did not explain my concern well enough. I understand why
one would want to mandate that a (or several (specific SD-WAN are traversed.
(I could debate the utility, but operators and customers often want things I
wonder about.) That is not the source of my concern. It is unclear who is
expected to enforce the mandatory traverse case, and how loops are avoided.
Suppose that SD-WAN A is connected to SDS-WAN B, which is connected to
SD-WAN C and D. And D is connect to SD-WAN B and E, where the egress
exists. A Geneve packet is sent with an include indicating that SD-WAN B
must be traversed. The packet happens to go theorugh SD-WAN A to SD-WAN B
(meeting the traversal requirement), then to SD-WAN C, and then to the
SD-WAN D. However, by the time the packet arrives at SD-WAN D, there is no
indication in the packet that it went through SD-WAN B. WHich would seem to
require D to send the packet back to SD-WAN B. Which is clearly not what is
desired. How does the gateway to SD-WAN D know that it si fine to keep
forwarding towards the destination (egress from E) rather than returning the
packet to B? I could understand how it worked if there was also a route
record. Or if the Include was removed once it was satisfied. But the draft
does not call for either of those behaviors. </jmh>
[Linda 2] Your illustration regarding potential loops and the lack of
explicit enforcement mechanisms is entirely valid. However, as noted in the
draft, it is out of scope for the IETF (and this document) to define how the
cloud backbone enforces client-specified traversal preferences. The
Include-Transit Sub-TLV is intended only to convey the client's desired
intent or preferences. How about adding this sentence to the section:
"., this indication reflects preference only and does not imply any
guarantee of traversal. Enforcement of the include list is outside the scope
of this document and must be realized, if needed, through mutual agreement
and provider-specific mechanisms.."
<jmh2>Note that in the end I am not the one you have to satisfy. But, from
where I sit, a behavioral marking that can't be acted upon without
additional protocol behaviors (which ar enot obviously valid to me) is not a
marking we can have in an RFC. It does not lead to interopeable
implementation. </jmh2>
[Linda3] Your points are well taken. That said, there is precedent for this
approach in RFCs 8670, 7752, and 8306, where protocol elements convey intent
or preference, but their interpretation and enforcement are left to local
policy or controller behavior. In the same spirit, the Include-Transit
Sub-TLV expresses the originator CPE's intent to prefer certain transit
regions, while how the Cloud Backbone enforces that preference is
intentionally left out of scope for this document..
<jmh3>The problem I have is that I can't figure out how, if the gateways are
forwarding packets simply as IP encapsulated Geneve packets, they can
conform to the intent. There is an assumption about how the gateways do
their job, and how they are controlled, that is unstated. This seems to
leave a high probability of inconssitent implementation. As far as I can
tell, to comply with the policy, the gateway into the included domain would
have to modify the geneve packet to remvoe the intent. Which, as I
understand it, is against the RFCs.
</jmh3>
Minor Issues:
...
In section 5, in describing the Ingress GW processing, the text is
written
as if the outer IP destination address will always become the egress
gateway. As I understand it, if the path goes through multiple SD-WAN,
the
outer IP address at each stage is that of the next gateway? Could the
text
be rewritten to make that clear. Also, doesn't this imply there is a
"transit gateway" case as well as ingress and egress?
[Linda] The GENEVE header remains during transit across the Cloud Backbone
and is removed by the egress Cloud Gateway before the packet is forwarded to
the destination CPE. The packet is forwarded natively on the final SD-WAN
segment (egress GW to destination CPE) without GENEVE encapsulation.
<jmh>I am still missing something. It may be that I am misunderstanding the
interaction between mutli-segment SD-WAN and GENEVE. Suppose that we have
GW1 - SDWAN A - GW 2 - SDWAN B - GW-3. When the packet arrives at GW-1 with
the multi-segment SD-WAN option, GW1 decides (subject to the constraints of
the options in the packet) that the packet should go to GW2 in orderr to get
to GW3. As I understand it, GW1 will replace the outer IP destination
(which was GW-1 upon arrival) with the IP address of GW2. But the text says
that it will replace the destination address with the egress IP address
(GW-3, or maybe something beyond that.) </jmh>
<jmh2>I do not see a response to this issue</jmh2>
[Linda3] Sorry for missing this one. The ingress GW determines the
appropriate egress Cloud GW based on its internal logic or policy, or via
the Egress GW Sub-TLV included in the Multi-Segment Metadata.
The destination address in the outer IP header of the GENEVE packet should
be determined by the Cloud Backbone. This address is intended to reach the
egress Cloud GW identified by the Egress GW Sub-TLV (if present), or the
optimal egress GW selected based on the destination CPE address.
Changed the text to the following:
<jmh3>We are in amulti-segment SD-WAN. GWI is the ingress, GWE is the
Egress. and the selected path is through GW2 and GW3. If GWI changes the
outer IP address to be the address of GWE, then how does it direct the
packet to GW2, and thence to GW3? This may be related to the above issue of
an assumed unspecified behavior at SD-WAN gateways. </jmh3>
I do not know if this is a major concern, a minor concern, or merely a
confused reviewer. There is a description in section 9 of an attack to
steal data service (conceptually, an understandable problem.) However,
I
am unable to figure out what set of access to what set of places the
attacker must have, nor how adding authentication to the CPE / GW
exchange
would actually help prevent this attack. In part this is because the
attack appears underspecified, and in part this is because the
remediation
appears underspecified.
[Linda] does it help to add this sentence to the introduction?
In this document, "multi-segment SD-WAN" refers specifically to deployments
with two SD-WAN edge segments: one from the originating CPE to the ingress
Cloud Gateway, and one from the egress Cloud Gateway to the destination CPE.
There may be additional SD-WAN segments or forwarding domains between the
ingress and egress Cloud Gateways across the Cloud Backbone, but their
internal behavior is out of scope for this specification.
<jmh>Nope, sorry. That does not tell me what the security threat is that
leads to wanting authentication. It also does not tell me how the
authentication is actually to be done. (I naive reading is that you are
inventing an authentication extension, with insufficient specificity, to
some unspecified protocol between the CPE and the first SD-WAN gateway.)
</jmh>
[Linda2] Section 9 describes the consequence (data theft) but does not
clearly articulate the security threat or the authentication model. To
clarify:
1. The threat is that a malicious or misconfigured CPE could inject
SD-WAN metadata intended for another tenant, attempting to use or redirect
traffic through paths it is not authorized for.
2. Authentication is needed to verify the origin and legitimacy of the
SD-WAN metadata, ensuring it is associated with an authorized endpoint.
<jmh2>At the very least, this needs to be better explained in the draft. I
think the issue is larger. Adding security to the CPE-SDWAN connection
seems to be largely irrelevant if that CPE is compromised. Additionally, if
the SDWAN gateway accepts traffic from arbitrary devices, taht would seem to
be an unerlying SDWAN problem, not a multi-segment security issue.</jmh2>
[Linda3] do you think the following text for Bullet c) under Section 9.1 can
reflect those two key points?
(c) Potential stealing of Cloud Backbone bandwidth:
A threat actor, such as a malicious or misconfigured C-PE, could inject
SD-WAN metadata intended for another tenant, attempting to redirect traffic
through Cloud Backbone paths it is not authorized to use. For example, a
legitimate Cloud subscriber pays for Cloud Backbone transport between CPE-A
and CPE-B. An attacker, who controls two locations (Node-A and Node-B),
might construct a packet with CPE-A's address as the source and include
CPE-B in the SD-WAN Endpoint Sub-TLV. The packet, when sent to the ingress
Cloud GW, would appear to be a legitimate flow between CPE-A and CPE-B.
After exiting the egress Cloud GW, the attacker could rewrite the outer
addresses to resume communication between Node-A and Node-B, effectively
tunneling traffic via the Cloud Backbone without authorization or payment.
To prevent such misuse, it is necessary to authenticate and verify the
origin and legitimacy of the SD-WAN metadata to ensure it is associated with
an authorized and registered CPE endpoint. This validation protects against
both spoofing and cross-tenant policy violations. While it is not necessary
for Cloud GWs to decrypt or re-encrypt payloads, they must enforce metadata
integrity using authentication mechanisms such as those defined in [RFC2403]
and [RFC2404]. These mechanisms rely on cryptographic hashing algorithms
(e.g., SHA2 224/256/384/512) as part of a Hashed Message Authentication Code
(HMAC) to validate packet authenticity.
<jmh3>This sseems to be an underlying SD-WAN security problem, not a
multi-segment problem. It seems like the same attack could be done in a
single-segment SD-WAN? If that is true, and if the existing SD-WAN RFCs
have this problem, then I would think noting in the remediation that this
applies more broadly would seem to help. If I am wrong about the
applicability, some indication of why it is only a problem in multi-segment
would be desirable.
</jmh3>
<jmh>Thanks.</jmh>
_______________________________________________
rtgwg mailing list -- [email protected] <mailto:[email protected]>
To unsubscribe send an email to [email protected]
<mailto:[email protected]>
_______________________________________________
rtgwg mailing list -- [email protected]
To unsubscribe send an email to [email protected]