Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
Eric Rosen <erosen@cisco.com> Fri, 10 January 2014 16:06 UTC
Return-Path: <erosen@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E96761AE0D8 for <mpls@ietfa.amsl.com>; Fri, 10 Jan 2014 08:06:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.039
X-Spam-Level:
X-Spam-Status: No, score=-15.039 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bn_XCcmWdVWD for <mpls@ietfa.amsl.com>; Fri, 10 Jan 2014 08:06:18 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) by ietfa.amsl.com (Postfix) with ESMTP id 341D21AE0CB for <mpls@ietf.org>; Fri, 10 Jan 2014 08:06:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3620; q=dns/txt; s=iport; t=1389369968; x=1390579568; h=from:to:cc:subject:in-reply-to:reply-to:date:message-id; bh=/54oyXII8KQH2t0g6liUaOIguOzrlgAtUagQTGexwjc=; b=QHqu3VzymNTnHW6LLC89gqKhQFTZJOFhFM5OE0h+fHvtF63Jw6oMp1kI aTPpgRFxDHkQef3ckahADqWOvJ6N1WnbyK7JkTH5q92xYl8plNJPdN/bF mfjjJirPZj7l0Dy8kLZaE027othtbIYyWtWMz7S0UGTYXUpg28Uq2wPKZ E=;
X-IronPort-AV: E=Sophos;i="4.95,639,1384300800"; d="scan'208";a="296528626"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-8.cisco.com with ESMTP; 10 Jan 2014 16:06:08 +0000
Received: from erosen-linux.cisco.com (erosen-linux.cisco.com [161.44.70.34]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id s0AG67ek015245 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Jan 2014 16:06:08 GMT
Received: from erosen-linux (localhost.localdomain [127.0.0.1]) by erosen-linux.cisco.com (8.13.8/8.13.8) with ESMTP id s0AG6627006926; Fri, 10 Jan 2014 11:06:06 -0500
From: Eric Rosen <erosen@cisco.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
In-reply-to: Your message of Thu, 09 Jan 2014 18:32:47 +0000. <52CEEB4F.2010609@cs.tcd.ie>
Date: Fri, 10 Jan 2014 11:06:06 -0500
Message-ID: <6925.1389369966@erosen-linux>
Cc: mpls@ietf.org
Subject: Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: erosen@cisco.com
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2014 16:06:20 -0000
Eric> Aren't there link layer encryption schemes that protect the Eric> confidentiality of all traffic on the link? I don't see why one would Eric> want an MPLS-specific protocol for "single hop" encryption. Stephen> Are those widely used? I'd be interested to know. Well, if one thinks that "single hop" encryption is an important tool for ensuring privacy, the first thing one should do is look at the state of the art and figure out why there isn't more deployment. Stephen> If not, then this tool as another tool in the toolbox may be of Stephen> use. And why would an MPLS-specific single-hop encryption scheme gain any more deployment than a more general link layer encryption scheme? I suspect that service providers don't see how protecting their users' privacy in this manner is going to result in a positive return on investment for them. Stephen> And those don't address the end-end (or edge-edge) cases, right? Wouldn't ubiquitous link layer encryption be the best defense against any sort of wire tapping? Then not even the network addresses appear in the clear on the wire. Of course, an enduser who is worried about pervasive monitoring might not want to rely on the service providers to protect his traffic. But an edge-to-edge MPLS-specific scheme won't provide any more confidence, as it still relies on the service providers to ensure privacy. Endusers don't generate MPLS traffic. Stephen> I'm told end-end is right also for an LSP An LSP typically begins at the ingress point to a service provider backbone, and typically ends at the egress point of that backbone. There are scenarios in which there are multi-provider LSPs, but that is still not end-end, as the source and destination hosts are rarely involved. Note also that the ingress node and egress node of a particular LSP often do not have a control plane connection between them, and in many cases neither knows the identity of the other. There are a number of internet drafts that have addressed the use of IPsec in MPLS/BGP/VPN environments, e.g.: - draft-ietf-l3vpn-ipsec-2547-05 (expired) - RFC 4023, section 8.1 - RFC 5566 But there has never been enough interest (measured in dollars) to deploy any of the security schemes described in these drafts. > not all traffic being sent in an LSP is IP True enough. That doesn't preclude the use of IPsec, since one can always encapsulate anything inside IP and then use IPsec transport mode. That's what draft-ietf-l3vpn-ipsec-2547 proposed for one kind of non-IP packet (MPLS). Eric> So, just what is the unsolved problem addressed by this draft? Stephen> I guess I'd refer to draft-farrell-perpass-attack I don't think that draft mentions any MPLS-specific issues, nor does it suggest that there is a need to encrypt parts of the MPLS label stack. Since MPLS labels have local significance, I don't think there's that much to be learned by looking at the last billion label stacks that appeared on the wire. If there is some analysis to show otherwise, that would be interesting. Adrian> Some people have noted that per hop encryption/decryption might be Adrian> an issue. Others have countered that ETH h/w can already handle Adrian> MACsec at line rate. e2e encryption seems (to me) to be less likely Adrian> to be an issue. I think encryption at the network layer is much more complicated to do at scale than is encryption at the data link layer. There's just a lot more to figure out on a per-packet basis, and the system design becomes more complex.
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Eric Rosen
- [mpls] FW: I-D Action: draft-farrelll-mpls-opport… Adrian Farrel
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Mark Tinka
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Adrian Farrel
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Stephen Farrell
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Mark Tinka
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Adrian Farrel
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Eric Rosen
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Stephen Farrell
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Andrew G. Malis
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Mark Tinka
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Mark Tinka
- Re: [mpls] FW: I-D Action: draft-farrelll-mpls-op… Mark Tinka