RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Bhargav Bhikkaji <bhargav@force10networks.com> Tue, 10 July 2012 02:58 UTC

Return-Path: <bhargav@force10networks.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 057D511E80A1; Mon, 9 Jul 2012 19:58:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.091
X-Spam-Level: *
X-Spam-Status: No, score=1.091 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_COM=0.553, HOST_EQ_STATIC=1.172, HOST_MISMATCH_NET=0.311, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b5v3ecdDz9Yk; Mon, 9 Jul 2012 19:58:48 -0700 (PDT)
Received: from mx.force10networks.com (207.47.62.31.static.nextweb.net [207.47.62.31]) by ietfa.amsl.com (Postfix) with ESMTP id 43C6D11E80F1; Mon, 9 Jul 2012 19:58:48 -0700 (PDT)
Received: from EX07-SJC-MBX1.force10networks.com ([fe80:0000:0000:0000:30d7:5b59:107.47.36.196]) by exch7-sjc-fe.force10networks.com ([10.11.0.87]) with mapi; Mon, 9 Jul 2012 19:59:14 -0700
From: Bhargav Bhikkaji <bhargav@force10networks.com>
To: Tal Mizrahi <talmi@marvell.com>, Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 09 Jul 2012 19:59:12 -0700
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1d6hqW9ssineDjRymcI0+sUBeL5QAGlYJgABDKUVA=
Message-ID: <EB72E43FE49DA8449253018A9FA7422706AAC3C65C@EX07-SJC-MBX1.force10networks.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743E91@IL-MB01.marvell.com>
In-Reply-To: <74470498B659FA4687F0B0018C19A89C01A0F8743E91@IL-MB01.marvell.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_EB72E43FE49DA8449253018A9FA7422706AAC3C65CEX07SJCMBX1fo_"
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 02:58:51 -0000

Hi Tal,

Thanks for your comments. Pls see inline [BB] for response

-Bhargav

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of Tal Mizrahi
Sent: Monday, July 09, 2012 12:06 PM
To: Balaji venkat Venkataswami
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Hi Balaji,

Thanks for the prompt and detailed response.
Please see inline.

Regards,
Tal.

From: Balaji venkat Venkataswami [mailto:balajivenkat299@gmail.com]
Sent: Monday, July 09, 2012 6:47 PM
To: Tal Mizrahi
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Tal,

Comments inline
On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com<mailto:talmi@marvell.com>> wrote:
Hi Balaji,

A few clarification questions - I think it would be good to clarify these issues in the draft:
1.      Since the label hopping mechanism relies on PTP, I understand that PTP traffic itself does not use label hopping, right?

The PTP traffic itself does not use label hopping.

2.      Is there something preventing the attacker from attacking PTP, thus causing DoS to the data plane?

It would be difficult for the attacker to identify which LSP is the PTP LSP for a specific VPN traffic (flow / set of flows) that is protected by this scheme. There is no information except on the ingress and egress PEs that identifies which is the PTP LSP for a particular VPN traffic protected by this scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV) computed over part of the packet header?

It serves as a digest from which certain specific bits are chosen to become the innermost label. Which bits are chosen depends upon the bitmask exchanged during the control plane.
[TM] Right. Unless I am missing something, that sounds like a variant of an ICV: it basically produces a label which is a function(packet payload, pre-shared secret). That is essentially what an ICV does, unless I am missing something?

[BB]: Agreed, the scheme we proposed is a of ICV scheme.

4.      Is there something in your approach that would prevent an attacker from a replay attack?

For a reply attack to succeed, the replay should time the labels correctly otherwise the traffic gets rejected.
[TM] Right, so assuming the attacker is "fast enough", the attacker can replay during the time slice (which is ~seconds)?

5.      Looking at "Algorithm 3" I was not sure: does the receiver check two consequent time slots? I could not see such a check. I am referring to a case where the sender transmits at the end of a time slot, and the packet is received at the beginning of the next time slot. That would mean the receiver has to be able to tolerate two concurrent time slots, right?

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm. Maybe a little more fine tuning is required on this.

6.      The security parameters K, TS, A, I are exchanged over a secure link, which basically assumes there is a pre-shared key between the peer PEs. A naive question would be: how is your approach better than just using a standard ICV, based on the existing pre-shared key?

While the ICV may protect against modification of the inner payload one cannot prevent spoofing attacks if the algorithm for the ICV is deduced. Our scheme provides facility to change the labels from time slice to time slice so that guessing what packet belongs to which VPN traffic itself becomes difficult. This is the first line of defense. If we provide ICV alone we protect against modification but not with replay attacks. The proposed scheme protects against VPN traffic identification (so replay attacks cannot be made) and modification as well through the ICV which is the innermost label.
[TM] Since an ICV uses a pre-shared key, even if the algorithm is well-known to the attacker, the attacker cannot forge/spoof it, assuming that the attacker is not exposed to the key. ICV mechanisms typically support anti replay, e.g., the IPsec AH.

[BB]: We had submitted a draft where certain bits of IPSec digital signature is used as "additional label". This would help to identify forged/spoofed packet.

http://tools.ietf.org/html/draft-bhargav-l3vpn-inter-provider-optcsec-01

thanks and regards,
balaji , shankar and bhargav

Tal.