Re: [mpls] Poll to see if we have consensus to adopt draft-farrelll-mpls-opportunistic-encrypt as an MPLS wg document
Eric C Rosen <erosen@juniper.net> Mon, 22 June 2015 13:24 UTC
Return-Path: <erosen@juniper.net>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A2C11A8AB7 for <mpls@ietfa.amsl.com>; Mon, 22 Jun 2015 06:24:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.798
X-Spam-Level:
X-Spam-Status: No, score=0.798 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xM2Mhvfj88ig for <mpls@ietfa.amsl.com>; Mon, 22 Jun 2015 06:24:43 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0104.outbound.protection.outlook.com [65.55.169.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEE3F1A8AB6 for <mpls@ietf.org>; Mon, 22 Jun 2015 06:24:42 -0700 (PDT)
Received: from DM2PR0501MB1103.namprd05.prod.outlook.com (10.160.245.13) by DM2PR0501MB1328.namprd05.prod.outlook.com (10.160.130.16) with Microsoft SMTP Server (TLS) id 15.1.195.15; Mon, 22 Jun 2015 13:24:41 +0000
Authentication-Results: tools.ietf.org; dkim=none (message not signed) header.d=none;
Received: from [172.29.34.216] (66.129.241.11) by DM2PR0501MB1103.namprd05.prod.outlook.com (10.160.245.13) with Microsoft SMTP Server (TLS) id 15.1.190.14; Mon, 22 Jun 2015 13:24:39 +0000
Message-ID: <55880C91.507@juniper.net>
Date: Mon, 22 Jun 2015 09:24:33 -0400
From: Eric C Rosen <erosen@juniper.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Loa Andersson <loa@pi.nu>, "mpls@ietf.org" <mpls@ietf.org>, "draft-farrelll-mpls-opportunistic-encrypt@tools.ietf.org" <draft-farrelll-mpls-opportunistic-encrypt@tools.ietf.org>
References: <55828B69.3070603@pi.nu>
In-Reply-To: <55828B69.3070603@pi.nu>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [66.129.241.11]
X-ClientProxiedBy: BLUPR0401CA0021.namprd04.prod.outlook.com (25.162.114.159) To DM2PR0501MB1103.namprd05.prod.outlook.com (25.160.245.13)
X-Microsoft-Exchange-Diagnostics: 1; DM2PR0501MB1103; 2:pJg/QKg06C5Ed14xx4lsF654W3n5A9DS0fF6R+TtRoJnW+Hgtk994sv7aTu66/Jb; 2:wFO7W2QDx5euuoP+gz6TOKePvYlMgk+1tIq0MG9MH0wTHQ3uzGhothKz9inhQ4mzLthlN+VMhINZcHs5w9UYz58Sl73XVaYFd49g5fFT659SELreYtbjgw8eyZ8r8ifYUZq13HalpTDxhWEzLyOsMA==; 6:r9Xy3VZAYm/1p3hGqkDvuHVTVcnvA0oTBzyU8PfDzzq0AZJqA2Zffe3kEpzDRucKvcdOoyDHiowtaG8aExGBA95dIUjMg0cEC7b9BKt5b7G6dwZPhakAO9Rd3Kn9hYRsfPreaz7DnMLP62cHZbwyUuHJe0x29hMCoZobo09A5tlDnoEmLablby7AFRYpBYBNFwtz4sq/w8I5avFBfflIQqgjRT34LjPUSeODIu7IZZ+Dko+DQGR1YyO9Qi6YRMtqY9h8l/Vv5dj+aR1GdqWsyvPi5vfDNtlW6EylvKMxkv8axtIeCHJPjVIpfh7SfrTYGfPNHmCFbRUgb1WUoGkGnfNGUjtZ3ft6s4pFK2ZCfr66lg9QXPndK4dPUy7svVt/0EUuufCKBK9GSmsY/5BXkvcPBQVUb5lk5CJbmH8+bBmXt/vDf2Kr0WcLSWLiW8/J0g2rojlt5yn7/6A6EiNuNTGmWArzsoDbyaAG5jv5oD8V+8E01pPCzux1mOel0TAs
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0501MB1103; UriScan:; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0501MB1328;
X-Microsoft-Antispam-PRVS: <DM2PR0501MB1103C6688E801050B09B8D5FD4A10@DM2PR0501MB1103.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(520004)(5005006)(3002001); SRVR:DM2PR0501MB1103; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0501MB1103;
X-Microsoft-Exchange-Diagnostics: 1; DM2PR0501MB1103; 3:6fKDWxdiwQs4+a3G43HLWZxTtcVwJtppfqGmw/jt0wGV9XpKRu8yVOPR5i8Y0erSfP6uiF9809Ku1eErs1Sa7He1sYP56J2H8JoWipxtWr+foKs3YLWeRDrny/Bxtv1xJAAQFb+A1hx536Tzd2h7GGNtg5sRs6whBKn4ulrONSk8u8LRL61jNbEA9Rw8xXqM1ExDMynriyZu6X5toQryT83aSOpKuUIKUsXCdtgHm9kD+/XZqdzHKHvmnIBL2GlaM8jBlvgsW0vQTjoqIbPPR/L1pPp+IBb0pP3IGoELERBtlmgZfSJc2dfESOe3uQ9X
X-Forefront-PRVS: 06157D541C
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6009001)(6049001)(50466002)(64126003)(83506001)(33656002)(66066001)(5001770100001)(65956001)(2501003)(40100003)(122386002)(77156002)(4001350100001)(5001960100002)(92566002)(230783001)(62966003)(2950100001)(65816999)(42186005)(76176999)(54356999)(50986999)(87976001)(77096005)(2201001)(86362001)(46102003)(189998001)(47776003)(36756003)(23746002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1103; H:[172.29.34.216]; FPR:; SPF:None; MLV:sfv; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; DM2PR0501MB1103; 9:rYAQPp0/gGbwWetgyOC81lxqkIVOF/GDjUjkcbT58e+QAzr9Xsn2ldA57TECXML2xNr4Zbj87qpOvQc0DLxg6cDcvib7T4hRbOr6CRwmrg7+x+RGkQEjLkgVC6TLp6h9plKrW34z2HXY4prXzr0eWwRPKaDR/Bj+Yc5xcZ8QAyk+dL2NHVBozzAObffoThOrdODMt60nCULgDWa4oRbvAH/uIicg0RCi/qA6DXutNzNnMMkW3GoVDt4slWpJIJs1oDg7DdseJlDzliu8LfUSDBFe7iwF9se05Ac1xdIOpu6fJp2mLRtGze04x5Z4iYp20B/bUGb8MDPN6rw2UxdhK6xuq5konzNolap9509mVqDtCELgR3euo14Vb6fyjfpVYizSCbB/D5n4PNRWkIW457LItaL1MszHSORZyUBN5mPnXyGO0EQMecsqRu18Rcq75s8WgGpnqRUNFMua4Q0So7nl6+t1Qye3IcIt8vN9MzPhODjI6SrY2SSyklHUTM9kNne+k7exSDf+YM+Ou55LJpwPkifBc+EvmnzbY6cUp76oGSbNQCFqHIAPWMSAaeDQFHBYeoUROBnQ/xSkqkVUnjWOTDjvPQASbwNoVxIrOOmZ4LW+hEpNBTe/7bEz1ZIQm0AwPgAkBlxXEDBGHFqkuq6c8hSqMIM7a3eYuvsiuoxI5KqeYHE7VCDASEr+3MdIDXXDJDnqtifqLPBZKYggTcYXhVhFW9bRr12Szd4RnWp/H/QcEVA5dHs/q/njbx9+d4P5mf8GFwXPkGonlxsQHoErFJpKndKC2PKLqAwBANHIE7eHM5wru/BT46enI1VZjl1AYUOk7wm+YKB0Y9IYUFHlvNFxlv0XTqLuyxvJqvo0LI1zE2WZhX4kYm1thHzl
X-Microsoft-Exchange-Diagnostics: 1; DM2PR0501MB1103; 3:apauZu3YMjenvFPOm3pzx5czkggSQv9gy9kooCPkJywrDSiOr2VAz4pIbVl82m1lUTAHxpym6LN2WpIbYONox6lycR5hxeDtNDel0N4JVVzSXGb/9hXJ+VNhDvRrdHtNQzvrJs2Zfu3RI7thrUAF2g==; 10:NQPYKQcpCSmjVuvIXjpf1RKb1V1MHX7dNnD16r8v6kcd7utt2j82cbu508YHTLjd96ziv5XmloaPSsYEmziBWk2YhNAdGEaQXv6dYacmf7A=; 6:lWSiYGlKB3NPHqfAVtOlVOvWXYqwJv8FZtO6dLFkhq2sEWho/RWNMXuo2kXna4LU
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jun 2015 13:24:39.3897 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1103
X-Microsoft-Exchange-Diagnostics: 1; DM2PR0501MB1328; 2:pIQEgUmme8Ib1yLndLU8a6VdVqHb2U6sxUyGvxXuEbCkYQVqdRQqYUrWxZ6QpysG; 3:rHO0CS8520wVw1nKbOn9ZIx38w1K5Kcn7EAD9kFBKP/3tSgm2iVmmi3Ub8YuFZA3uS0/P//eTYPa2Dqn5u7bzjhs4T+CdulpeAJITG6CHcfg4GLgBG0gc+6wpczDy+vn8sm4d/x/ksIqKVVJRE/opg==; 23:pOFuegFqcDiqsys94bdD1Exr1zWiDJqiDe2M31JbFFuCxRl6qcEfNK1q+L6mmzQqSHjzzGRo+7nBrHqhoUcRwcwBe+EESmIZbzQqjk62ApPbI/pNWE79JXR91AfYhMIXXudgm362Aa0nHjGavN+0HyqIYqIsbUWJ3u/ATz6GMJRmPyQwcxq8uv0VIRhuHFbExLqlTcn7Cpb5vV5D/aFAPCODFjsM/AThNruCidDx2Nfg75YHRNs1Q9DLmDFxxqgO
X-OriginatorOrg: juniper.net
Archived-At: <http://mailarchive.ietf.org/arch/msg/mpls/Npt4nrNJHSM7YSC9rXMmFafK16k>
Cc: "mpls-chairs@tools.ietf.org" <mpls-chairs@tools.ietf.org>
Subject: Re: [mpls] Poll to see if we have consensus to adopt draft-farrelll-mpls-opportunistic-encrypt as an MPLS wg document
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jun 2015 13:24:44 -0000
I don't think we can tell yet whether this draft really provides a good basis for future work. As such, it seems premature for the WG to adopt it. I think there are several major issues that should be confronted first. The draft seems heavily focused on P2P LSPs. That wouldn't be a problem if it were about pseudowire security. But it's a big problem if the draft is supposed to apply to MPLS generally. There's a lot of MPLS out there that uses LDP or BGP (or even IGP) to bind labels to address prefixes, thereby creating MP2P LSPs. If that's not going to be handled, I don't see how the draft can claim to be providing an MPLS security scheme. Of course, it could be that MPLS is not the right layer for security; I'm not sure that any one security scheme is going to be suitable for all uses of MPLS. The idea of applying security on a per-LSP basis doesn't really seem right either. In VPN, with per-address-prefix labeling, there could be hundreds of thousands of LSPs. I can see someone claiming that security needs to be provided on a VRF-to-VRF basis rather than on a PE-to-PE basis, but having security on a per-address-prefix basis seems like way too much granularity. I can't really tell from the draft how it would be intended to apply to VPN, so I don't really know what the authors have in mind for securing VPNs. The draft would really benefit from having some worked out examples of how MPLS security would work in various VPN deployment scenarios, including the following (and combinations thereof): - Multi-AS VPN with "option b" interconnect - Multi-AS VPN with "option c" interconnect - VPN with per-address-prefix labels assigned by BGP - VPN with per-VRF labels assigned by BGP The multi-AS VPN cases are particularly interesting, because they make use (in different ways) of nested LSPs. Someone who wants privacy for his VPN traffic will want security applied to the inner LSP (the one that goes from the ingress PE to the egress PE), not just to the outer LSPs (the ones that go from ingress PE to ASBR, etc.) but it's not clear whether any of the techniques in the draft can be used that way. There are also cases where labels get assigned to anycast addresses. I wonder how the security scheme would be applied to those cases. There are other issues in the draft as well, such as whether MPLS-specific hop-by-hop security is really useful when one can use simpler layer 2 security schemes instead. But right now my main concern is that the end-to-end scheme will turn out to have very limited applicability. Working out some realistic examples would help us understand whether this is really the right way to proceed.
- [mpls] Poll to see if we have consensus to adopt … Loa Andersson
- Re: [mpls] Poll to see if we have consensus to ad… Alexander Vainshtein
- Re: [mpls] Poll to see if we have consensus to ad… Adrian Farrel
- Re: [mpls] Poll to see if we have consensus to ad… Andrew G. Malis
- Re: [mpls] Poll to see if we have consensus to ad… Stephen Farrell
- Re: [mpls] Poll to see if we have consensus to ad… Gregory Mirsky
- Re: [mpls] Poll to see if we have consensus to ad… Eric C Rosen
- Re: [mpls] Poll to see if we have consensus to ad… Stephen Farrell
- Re: [mpls] Poll to see if we have consensus to ad… Eric C Rosen
- Re: [mpls] Poll to see if we have consensus to ad… Stephen Farrell
- Re: [mpls] Poll to see if we have consensus to ad… Adrian Farrel
- Re: [mpls] Poll to see if we have consensus to ad… Eric C Rosen
- Re: [mpls] Poll to see if we have consensus to ad… Stephen Farrell
- Re: [mpls] Poll to see if we have consensus to ad… Loa Andersson