Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-16 Thread Tero Kivinen
Daniel Migault writes: > Thanks for the comments, this matches how we envisioned to update the draft, > except that we envisioned the responder sends a N(DSCP) and that we also > indicated the support of the N(DSCP). I think you recommend not to have these > two notifications, which could work for

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-09 Thread Michael Richardson
Daniel Migault wrote: > As far as I understand it, yes, the two end sites are managed by the > MNO. So they should be able to either coordinate DSCP values (use the same ones), or they should know how to translate them between sites (before entering tunnel and/or after exiting tunnel).

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-09 Thread Daniel Migault
Hi Michael, As far as I understand it, yes, the two end sites are managed by the MNO. Yours, Daniel On Wed, Aug 9, 2023 at 9:27 AM Michael Richardson wrote: > > Tero Kivinen wrote: > > If we agree on the inner DSCP values, but map them differently that > > does not actually matter as

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-09 Thread Michael Richardson
Tero Kivinen wrote: > If we agree on the inner DSCP values, but map them differently that > does not actually matter as long as we never bypass some DSCP values > while mapping others, as every packet in the tunnel will have same > outer DSCP value thus will receive same processin

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-08 Thread Daniel Migault
Hi Tero, Thanks for the comments, this matches how we envisioned to update the draft, except that we envisioned the responder sends a N(DSCP) and that we also indicated the support of the N(DSCP). I think you recommend not to have these two notifications, which could work for us. Please see inlin

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-08 Thread Tero Kivinen
Daniel Migault writes: > I am coming back to one comment that has been made during the > presentation that DSCP values do not necessarily be associated with > a pair of SA. > > We want to organise tunnels where DSCP values are partitioned > between a subset of SAs. More specifically suppose that w

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-08-08 Thread Daniel Migault
I am coming back to one comment that has been made during the presentation that DSCP values do not necessarily be associated with a pair of SA. We want to organise tunnels where DSCP values are partitioned between a subset of SAs. More specifically suppose that we have g1 = (DSCP_a, DSCP_b), g2 =

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-27 Thread Daniel Migault
Thanks Tero, this is helpful and overall improves the design. Please see inline additional comments/questions. We basically would like to know if these DSCP selectors could be reasonably called "pseudo traffic selectors" or if someone believes that will be confusing. Feel free to suggest other alte

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Tero Kivinen
Daniel Migault writes: > I am under the impression that if one wants to ensure that the agreed DSCP > value takes the right SA we need to check that. As a result, I am inclined to > have in any case a MUST be checked. I am wondering if we are expecting this > check to take a significant overhead ?

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Michael Richardson
DSCP is mutable enroute. The numbers are from a palette of actions. It is explicite in the DS architecture that ISPs may and SHOULD remark it across boundaries. (I recall the diffserv WG 23 some years ago.. and I've been an operator of b2b VoIP, and we had to make sure we did not allow packets to

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Daniel Migault
Thanks for the comments. I am under the impression that if one wants to ensure that the agreed DSCP value takes the right SA we need to check that. As a result, I am inclined to have in any case a MUST be checked. I am wondering if we are expecting this check to take a significant overhead ? I do

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Tero Kivinen
Daniel Migault writes: > Let me know if that text addresses your concern or if you prefer a different > wording. I believe I should add some more specific references to 4301.  Note, that RFC4301 already describes how to handle DSCP, and your draft would actually change mandatory features of RFC430

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Daniel Migault
re and tunnel handling. Regards, > Valery. > > > > Scott, thank you for your review. Here are the responses to your > comments, see > > inline for details. > > > > Brs > > > > From: IPsec On Behalf Of Scott Fluhrer > (sfluhrer) > > Sent: Thurs

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-26 Thread Valery Smyslov
rom: IPsec On Behalf Of Scott Fluhrer (sfluhrer) > Sent: Thursday, July 13, 2023 2:58 AM > To: ipsec@ietf.org > Subject: [IPsec] draft-mglt-ipsecme-ts-dscp > > Hi, > >I rereviewed this draft, and have a few comments: > > - As the draft is written, the administrato

Re: [IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-23 Thread Harold Liu
Scott, thank you for your review. Here are the responses to your comments, see inline for details. Brs From: IPsec On Behalf Of Scott Fluhrer (sfluhrer) Sent: Thursday, July 13, 2023 2:58 AM To: ipsec@ietf.org Subject: [IPsec] draft-mglt-ipsecme-ts-dscp Hi,    I rereviewed this draft, and

[IPsec] draft-mglt-ipsecme-ts-dscp

2023-07-12 Thread Scott Fluhrer (sfluhrer)
Hi, I rereviewed this draft, and have a few comments: * As the draft is written, the administrator can specify that (for example) traffic with DSCP=3 must be protected, but other traffic is not. I don't believe giving administrators this option is a good idea, it can likely result in