Re: [mpls] Poll to see if we have consensus to adopt draft-farrelll-mpls-opportunistic-encrypt as an MPLS wg document

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 29 June 2015 21:53 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2259A1B355A for <mpls@ietfa.amsl.com>; Mon, 29 Jun 2015 14:53:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HMcFJ0-r5E11 for <mpls@ietfa.amsl.com>; Mon, 29 Jun 2015 14:53:45 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 697AB1A8AC7 for <mpls@ietf.org>; Mon, 29 Jun 2015 14:53:45 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 27627BE3F; Mon, 29 Jun 2015 22:53:44 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PPh-Xu-yeYEe; Mon, 29 Jun 2015 22:53:42 +0100 (IST)
Received: from [10.87.48.73] (unknown [86.46.30.169]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id A379ABE35; Mon, 29 Jun 2015 22:53:42 +0100 (IST)
Message-ID: <5591BE65.3080409@cs.tcd.ie>
Date: Mon, 29 Jun 2015 22:53:41 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Eric C Rosen <erosen@juniper.net>, Loa Andersson <loa@pi.nu>, "mpls@ietf.org" <mpls@ietf.org>, "draft-farrelll-mpls-opportunistic-encrypt@tools.ietf.org" <draft-farrelll-mpls-opportunistic-encrypt@tools.ietf.org>
References: <55828B69.3070603@pi.nu> <55880C91.507@juniper.net> <559129C8.7000407@cs.tcd.ie> <559196F1.90006@juniper.net>
In-Reply-To: <559196F1.90006@juniper.net>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/mpls/OEG1cZ_VSFC1fkDpcQHAiqGgulE>
Cc: "mpls-chairs@tools.ietf.org" <mpls-chairs@tools.ietf.org>
Subject: Re: [mpls] Poll to see if we have consensus to adopt draft-farrelll-mpls-opportunistic-encrypt as an MPLS wg document
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jun 2015 21:53:47 -0000


On 29/06/15 20:05, Eric C Rosen wrote:
> On 6/29/2015 7:19 AM, Stephen Farrell wrote:
>> What we're doing here I think is documenting a security
>> mechanism for this layer for use in cases when this layer turns out
>> to be what someone wants to use.
> 
> That sounds like a solution in search of a problem.

I guess it could if one wants to be argumentative but I'm
interested that other folks here who know far more about mpls
than I think this ought be adopted, so presumably others
disagree with your evaluation.

I would repeat though, that even if one wants some additional
more complex functionality later starting now with a simpler
specification on which one can build is IMO a far better and
much more practical approach when considering key management.

That said, I'm just a plumber here, and it's really for others
to say that they'd find this useful I think.

> 
> My point is that between the applicability restrictions (no MP2P) and
> the excessive granularity (security state per label), 

I'm not clear how one could avoid some state per LSP (is that
the same as per-label?) without getting into multiparty key
management, which is a technology with very little deployment
no matter the layer at which it is defined.

> it's hard to see
> that this is a reasonable approach.  Even if you brought it to PALS and
> renamed it to be "pseudowire security", the need to have security state
> per pseudowire seems like a problem.
> 
>>> The draft would really benefit from having some worked out examples of
>>> how MPLS security would work in various VPN deployment scenarios,
> 
>> Again, I think that the above would be done building on top of this
>> scheme, but not as part of this scheme. But I admit that I don't myself
>> understand those deployment scenarios enough to be certain of that.
> 
> First design the hammer, then figure out later whether we need to pound
> any nails?

Isn't that purely pejorative? I don't see how that's helpful.

> 
> I'd have thought that before the WG adopts the draft, there should be
> some clue as to how the proposed MPLS security mechanism would be
> applied to most of the uses of MPLS.  When asked about how it might work
> in various common deployment scenarios, I don't think it's appropriate
> to say "first we need to design the mechanisms, later on we'll figure
> out how to use them to actually solve problems".

Again, we're positing a two party key exchange here. If the WG don't
think that's useful that's fine. But (to up my rhetoric in response
to yours:-) asking to boil the multiparty key exchange ocean before
doing anything would be a fine recipe for doing nothing at all.

> 
>> Why would layer 2 [security] be simpler? If you mean because it
>> already exists
>> and can be used that's fine, but I'd be interested if there were some
>> way in which MACsec were substantively simpler.
> 
> No impact to MPLS, fixed and unchanging granularity (per-link rather
> than per-LSP), reduced state (no constantly changing nonce per label, no
> key per label) simplified data flow (security processing cleanly
> separated from network layer processing), not to mention simplified key
> distribution.  I'm having trouble seeing what hop-by-hop MPLS security
> adds except more complexity.

I disagree that that makes layer 2 security much simpler. It means
the complexity is hidden from the layer above, which is a benefit if
you don't need to see it, but most of the complexity is there just
as much even if hidden. Bear in mind that we are not saying that
there's anything wrong with layer 2 security here, but claiming
that it's that much simpler isn't convincing.

Cheers,
S.


> 
> 
> 
> 
> 
> 
> 
> 
>