Re: [Anima] MACsec as an alternative to L3-tunnels

Toerless Eckert <tte@cs.fau.de> Tue, 30 July 2019 20:42 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65589120089 for <anima@ietfa.amsl.com>; Tue, 30 Jul 2019 13:42:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.95
X-Spam-Level:
X-Spam-Status: No, score=-3.95 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 22S7xiTstN6U for <anima@ietfa.amsl.com>; Tue, 30 Jul 2019 13:42:04 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D483512004D for <anima@ietf.org>; Tue, 30 Jul 2019 13:42:03 -0700 (PDT)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [131.188.34.52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id D094E54802C; Tue, 30 Jul 2019 22:41:58 +0200 (CEST)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id C0914440041; Tue, 30 Jul 2019 22:41:58 +0200 (CEST)
Date: Tue, 30 Jul 2019 22:41:58 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: anima@ietf.org
Message-ID: <20190730204158.w7b7dviwk55cxfce@faui48f.informatik.uni-erlangen.de>
References: <DM6PR11MB3385255D58A133B186AA547EDBC60@DM6PR11MB3385.namprd11.prod.outlook.com> <20190724214603.llrersvrcgb4hy7p@faui48f.informatik.uni-erlangen.de> <20190724220015.sfzqxcozq4khc6ut@faui48f.informatik.uni-erlangen.de> <6709.1564009422@dooku.sandelman.ca> <20190725143632.5fktdhifgmtyx2gk@faui48f.informatik.uni-erlangen.de> <27695.1564184021@dooku.sandelman.ca> <20190729220921.j4y5oqtoj4hkfekg@faui48f.informatik.uni-erlangen.de> <18051.1564454793@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <18051.1564454793@localhost>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/IjxyHQpWstnymU9nZVsmkUG4tb8>
Subject: Re: [Anima] MACsec as an alternative to L3-tunnels
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 20:42:07 -0000

On Mon, Jul 29, 2019 at 10:46:33PM -0400, Michael Richardson wrote:
> It's not about keypair, it's about what IPsec would call the SPD, which is a
> way to select which traffic goes into which tunnel.  I would also have
> expected it to be able to select based upon VLAN tag and destination ethernet
> type, but people said that wasn't so.

I think my reference was more to what chips can do as to what
necessarily existing standaerds may say. There is this one issue of
having an 802.1ae capable switch port connected via a hub to multiple
host, in which case you could imagine to use a different set of keys to
each host but the public vendor documentation i found was quite
inconclusive whether this actually works in todays products.

Your reference to IPsec is also another big question. 
Right now, there is all this convoluted, 802.1x and AAA server MacSec
session setup mechanism.  Which natively is asymmetric, and AFAIK,
the extensions to make it symmetric whee either done only very recently or are
still TBD in ieee.  One solution is just to leverage all of this and
just declare that nodes need to use and trust their ACP domain
certificates - and be done. It would just be anothrer parallel ACP
secure channel mechanism beside IKEv2 and DTLS.

Personally i would love a simpler mechanism, but there is a different
simpler/nicer architectural solution and a simpler/nicer programmatic
solution: The simpler architectural mechanism is to tie MacSec into
IKEv2. But who would be the critical mass of people doing that work.
It's not easy. The simple pragmatic solution is to put ACP on top of
some ethertype like EAPoL and exclude it from 802.1x, build normal IPsec
ACP and then have small new ASA that simply auto-instantiate existing
MACsec for the data-plane.

> I would love to be told I'm wrong.
> I can see if one was building the minimum viable solution that can deal with
> state-level attackers on point to point fiber runs, that just encrypting
> everything works well.  

The fiber runs in my apartment complex are in rooms open to the public.
No need to hire overpayed federal employees to plug a fiber snooping
device into them. And the city wide fibers are either on open poles or
in digging distance of shovels through somebody elses garden (learned
that from comcast workers that dug up those gardens too to find the
shovel made fiber cuts).

Sorry. not directly on-topic but hopefully entertaining. 

If we want the least overhead solution, then its the last option i
mentioned. We did program that in tcl in a week as small ASA (send
random generated PSK to direct neighbor, auto-configure existing
MACsec to neighbor. Done). Of course this expects ACP to already be in
place, and if you can't exclude ACP from the MacSec encryption you have
to have a bit of logic in the ASA to avoid shooting yourself into the
feet.

Cheers
    Toerless

>     > if ACP can be separately encrypted from data-plane, but as long as ACP
>     > is responsible to manage the encryption key, it can equally encrypt
>     > both ACP and data-plane. Its just that right now, ACP is not optimized
>     > for fast reconvergence, so a data-plane could converge faster and then
>     > it might still need to wait for ACP. But thats solely a matter of
>     > routing protocol and aliveness parameters of ACP/data-plane.
> 
> 
> -- 
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
> 
> 
> 



-- 
---
tte@cs.fau.de