<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.37 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sheng-idr-e2e-encryption-in-sd-wan-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="e2e encryption SDWAN">Edge-to-edge Encryption in Multi-segment SD-WAN</title>
    <seriesInfo name="Internet-Draft" value="draft-sheng-idr-e2e-encryption-in-sd-wan-00"/>
    <author initials="C." surname="Sheng" fullname="Cheng Sheng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
        </postal>
        <email>shengcheng@huawei.com</email>
      </address>
    </author>
    <author initials="H." surname="Shi" fullname="Hang Shi" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shihang9@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Routing</area>
    <workgroup>idr</workgroup>
    <keyword>Multi-segment SD-WAN</keyword>
    <keyword>IPSec</keyword>
    <abstract>
      <?line 43?>

<t>The document describes the control plane enhancement for multi-segment SD-WAN to implement Edge-to-edge encryption, GW information exchange, include/exclude transit list exchange.</t>
    </abstract>
  </front>
  <middle>
    <?line 47?>

<section anchor="intro">
      <name>Introduction</name>
      <t>To interconnect geographically faraway branches or SASE resources, multi-segment SD-WAN is often deployed via cloud backbone<xref target="I-D.draft-dmk-rtgwg-multisegment-sdwan"/>. This document focuses on the scenario where the edge connects to the Cloud GW through unsafe public network such as internet, as shown in <xref target="Scenario"/>. IPSec encryption is used to provide the authentication, integrity and confidentiality of the data from edge to edge.</t>
      <figure anchor="Scenario">
        <name>Multi-segment SD-WAN</name>
        <artwork><![CDATA[
  (^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^)
  (            Region2             )
  (            +-----+             )
  (            | GW2 |             )
  (            +-----+             )
  (           /       \            )
  (          /  Cloud  \           )
  (         /  Backbone \          )
  ( Region1/             \Region3  )
  ( +-----+               +-----+  )
  ( | GW1 |---------------| GW3 |  )
  ( +--+--+               +--+--+  )
  (^^^^|^^^^^^^^^^^^^^^^^^^^^|^^^^^)
       |                     |
       | <-Public Internet-> |
    +--+--+                +--+--+
    |CPE 1|                |CPE 2|
    +-----+                +-----+              
]]></artwork>
      </figure>
      <t>To reduce the computing overhead of the Cloud GW, it is preferred to establish IPSec tunnel from edge to edge rather than from edge to Cloud GW. The overlay routing information is carried outside of the encrypted payload. When GW receives packet from CPE, it only needs to look at the unencrypted overlay routing header to do the forwarding. This document describes the control plane enhancement on top of <xref target="I-D.draft-ietf-idr-sdwan-edge-discovery"/> to exchange the IPSec SA and corresponding GW information between edges to enable edge-to-edge IPSec encryption. This document also defines an extension to exchange the include/exclude transit list information from egress edge to ingress edge.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="IPSEC">
      <name>Exchange IPSec SA for edge-to-edge encryption</name>
      <t>All CPEs are under the control of one BGP instance. <xref target="I-D.draft-ietf-idr-sdwan-edge-discovery"/> defines the mechanism for SD-WAN edges to discover each other's properties. The IPSec Key exchange between the CPE is via BGP update through RR. However, the granularity of IPSec SA in <xref target="I-D.draft-ietf-idr-sdwan-edge-discovery"/> is limited to per site, per node or per port and it does not specify if the IPSec is between edge to edge or edge to Cloud GW. To that end, this document defines a new route type to exchange the IPSec SA for edge-to-edge IPSec encryption. The format is shown in <xref target="e2e-route-type"/>.</t>
      <figure anchor="e2e-route-type">
        <name>Edge-to-edge IPSec encryption NLRI</name>
        <artwork><![CDATA[
               +---------------------+
               |  Route Type = TBD   | 2 octet
               +---------------------+
               |       Length        | 2 Octet
               +---------------------+
               | Route-Distinguisher | 8 octets
               +---------------------+
               |     SD-WAN-Color    | 4 octets
               +---------------------+
               |    SD-WAN-Node-ID   | 4 or 16 octets
               +---------------------+
]]></artwork>
      </figure>
      <t>where:</t>
      <ul spacing="normal">
        <li>NLRI Route Type = TBD: For advertising edge-to-edge IPSec encryption where the IPSec SA can be uniquely identified by a tuple: &lt;Route-Distinguisher, SD-WAN-Color, SD-WAN-Node-ID&gt;</li>
        <li>Route-Distinguisher: an 8-octet value used to distinguish routes from different VPN (see <xref target="RFC4364"/>).</li>
        <li>SD-WAN-Color: represent the SD-WAN site ID.</li>
        <li>SD-WAN-Node-ID: The node's IPv4 or IPv6 address.</li>
      </ul>
      <t>The IPSec SA related sub-TLVs remain the same as defined in <xref target="I-D.draft-ietf-idr-sdwan-edge-discovery"/> and is carried in the SD-WAN-Hybrid Tunnel Encapsulation attribute.</t>
    </section>
    <section anchor="exchange-corresponding-gw-information-between-edges">
      <name>Exchange corresponding GW information between edges</name>
      <t>To help the ingress Cloud GW(GW1) route and forward to the egress Cloud GW, the source CPE need to carry the egress GW information in the data plane. To that end, the CPE need to discover the corresponding GW and advertise the corresponding GW information to other CPEs. Note that there may exist multiple path between the CPE and the corresponding GW. The source CPE may need to choose a specific path. This document defines a new NLRI route-type to carry the corresponding GW information. The format is shown in <xref target="GW-info-route-type"/>.</t>
      <figure anchor="GW-info-route-type">
        <name>Corresponding GW information NLRI</name>
        <artwork><![CDATA[
               +---------------------+
               |  Route Type = TBD   | 2 octet
               +---------------------+
               |       Length        | 2 octet
               +---------------------+
               |     SD-WAN-Color    | 4 octets
               +---------------------+
               |    SD-WAN-Node-ID   | 4 or 16 octets
               +---------------------+
]]></artwork>
      </figure>
      <t>where: the SD-WAN-Color and SD-WAN-Node-ID is the same as in <xref target="IPSEC"/>.</t>
      <t>Depending on the deployment of the cloud backbone, there are two options for corresponding GW information discovery and advertisement.</t>
      <section anchor="option-1-link-sid">
        <name>Option 1: Link SID</name>
        <t>Assume that SRv6 or SR-MPLS is running on the cloud backbone. SD-WAN tunnels will be established between the CPE and the corresponding GW. For each tunnel, a link SID will be allocated by the GW. Then the link SID will be notified from the GW to the CPE through a dedicated hello protocol or manual configuration.</t>
        <t>A new Sub-TLV in the SD-WAN-Hybrid Tunnel Encapsulation attribute is defined as follows:</t>
        <figure anchor="GW-info-link-sid">
          <artwork><![CDATA[
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Type=TBD1 (Link SID subTLV)  |  Length (2 Octets)            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                            link SID                           ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>
      <section anchor="option-2-gateway-id-tunnel-ip-address">
        <name>Option 2: Gateway ID + tunnel IP address</name>
        <t>The GW site ID and the destination tunnel IP address can be used as the corresponding GW information. A new Sub-TLV in the SD-WAN-Hybrid Tunnel Encapsulation attribute is defined as follows:</t>
        <artwork><![CDATA[
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Type=TBD2 (GW info subTLV)   |  Length (2 Octets)            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      Egress GW Addr Family    | Address                       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ (variable)                    +
   ~                                                               ~
   |           Egress GW Address                                   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  SD-WAN Tunnel Addr Family    | Address                       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ (variable)                    +
   ~                                                               ~
   |                SD-WAN Tunnel Address                          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </section>
    </section>
    <section anchor="exchange-includeexclude-transit-list-from-destination-edge-to-source-edge">
      <name>Exchange include/exclude transit list from destination edge to source edge</name>
      <t>When a user tries to access certain service, the traffic may need to go through certain Cloud Availability Regions or Zones to get better security. Or the traffic can not go through certain Cloud Availability Regions or Zones due to the regulation. As described in <xref target="I-D.draft-dmk-rtgwg-multisegment-sdwan"/>, the traffic enforcement rule is indicated using the including/excluding transit list in the data plane which is encapsulated at the source edge.</t>
      <t>The destination edge knows the traffic enforcement rules for each service behind it and need to pass the include/exclude transit list to the source edge. This document proposes to carry the list in the client route using Metadata Path Attribute defined in <xref target="I-D.draft-ietf-idr-5g-edge-service-metadata"/>. Two new Sub-TLVs are defined to carry the include/exclude transit list.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not introduce any new security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.draft-ietf-idr-sdwan-edge-discovery">
          <front>
            <title>BGP UPDATE for SD-WAN Edge Discovery</title>
            <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Susan Hares" initials="S." surname="Hares">
              <organization>Hickory Hill Consulting</organization>
            </author>
            <author fullname="Robert Raszuk" initials="R." surname="Raszuk">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Kausik Majumdar" initials="K." surname="Majumdar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon</organization>
            </author>
            <author fullname="Venkit Kasiviswanathan" initials="V." surname="Kasiviswanathan">
              <organization>Arista</organization>
            </author>
            <date day="23" month="June" year="2023"/>
            <abstract>
              <t>   The document describes the encoding of BGP UPDATE messages for the
   SD-WAN edge node property discovery.

   In the context of this document, BGP Route Reflector (RR) is the
   component of the SD-WAN Controller that receives the BGP UPDATE from
   SD-WAN edges and in turns propagates the information to the intended
   peers that are authorized to communicate via the SD-WAN overlay
   network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-sdwan-edge-discovery-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.draft-ietf-idr-5g-edge-service-metadata">
          <front>
            <title>BGP Extension for 5G Edge Service Metadata</title>
            <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Kausik Majumdar" initials="K." surname="Majumdar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Haibo Wang" initials="H." surname="Wang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <date day="6" month="July" year="2023"/>
            <abstract>
              <t>   This draft describes a new Metadata Path Attribute and some
   sub-TLVs for egress routers to advertise the Edge Service
   Metadata of the directly attached edge services (ES). The Edge
   Service Metadata can be used by the ingress routers in the 5G
   Local Data Network to make path selections not only based on
   the routing cost but also the running environment of the edge
   services. The goal is to improve latency and performance for
   5G edge services.

   The extension enables an edge service at one specific location
   to be more preferred than the others with the same IP address
   (ANYCAST) to receive data flow from a specific source, like
   specific User Equipment (UE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-5g-edge-service-metadata-04"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.draft-dmk-rtgwg-multisegment-sdwan">
          <front>
            <title>Multi-segment SD-WAN via Cloud DCs</title>
            <author fullname="Kausik Majumdar" initials="K." surname="Majumdar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Venkit Kasiviswanathan" initials="V." surname="Kasiviswanathan">
              <organization>Arista</organization>
            </author>
            <author fullname="Ashok Ramchandra" initials="A." surname="Ramchandra">
              <organization>Microsoft</organization>
            </author>
            <date day="31" month="May" year="2023"/>
            <abstract>
              <t>   The document describes the methods to optimize the stitching of
   multiple SD-WAN segments on transit nodes across Cloud DCs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dmk-rtgwg-multisegment-sdwan-00"/>
        </reference>
      </references>
    </references>
    <?line 198?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Haibo Wang for his contribution to the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
