Re: [mpls] FW: New Version Notification for draft-farrelll-mpls-opportunistic-encrypt-04.txt

Uma Chunduri <uma.chunduri@ericsson.com> Fri, 30 January 2015 01:42 UTC

Return-Path: <uma.chunduri@ericsson.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB1E21A88D6 for <mpls@ietfa.amsl.com>; Thu, 29 Jan 2015 17:42:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wSkhwRSu0_Ge for <mpls@ietfa.amsl.com>; Thu, 29 Jan 2015 17:42:00 -0800 (PST)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A2121A88CF for <mpls@ietf.org>; Thu, 29 Jan 2015 17:42:00 -0800 (PST)
X-AuditID: c6180641-f79916d00000623a-d6-54ca824006bc
Received: from EUSAAHC001.ericsson.se (Unknown_Domain [147.117.188.75]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 36.03.25146.0428AC45; Thu, 29 Jan 2015 19:56:00 +0100 (CET)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC001.ericsson.se ([147.117.188.75]) with mapi id 14.03.0195.001; Thu, 29 Jan 2015 20:41:58 -0500
From: Uma Chunduri <uma.chunduri@ericsson.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "mpls@ietf.org" <mpls@ietf.org>
Thread-Topic: [mpls] FW: New Version Notification for draft-farrelll-mpls-opportunistic-encrypt-04.txt
Thread-Index: AQJzvBS/xUxOeeIyvKQcjxJu+FS4g5tkJK6AgABd/QCAADiAgIAAFPfggAEzewCAAC4IgIAGNx+wgAGluwCAIVq8UIAA4QeAgACXeLA=
Date: Fri, 30 Jan 2015 01:41:57 +0000
Message-ID: <1B502206DFA0C544B7A60469152008633F55D6B7@eusaamb105.ericsson.se>
References: <20150101142218.19294.18617.idtracker@ietfa.amsl.com> <006801d025cf$13a93a60$3afbaf20$@olddog.co.uk>, <54A560C2.9050803@cs.tcd.ie>, <DB4PR06MB457FDA76217736F43CDCEDAAD5C0@DB4PR06MB457.eurprd06.prod.outlook.com>, <CE03DB3D7B45C245BCA0D243277949362D16AA@MX104CL02.corp.emc.com> <DB4PR06MB4575B5AB8792B42A82360DDAD5D0@DB4PR06MB457.eurprd06.prod.outlook.com> <009501d026ab$004724f0$00d56ed0$@olddog.co.uk> <1B502206DFA0C544B7A60469152008633F51B22F@eusaamb105.ericsson.se> <065a01d02a99$71490c80$53db2580$@olddog.co.uk> <1B502206DFA0C544B7A60469152008633F55CF65@eusaamb105.ericsson.se> <54CA1A5D.3050801@cs.tcd.ie>
In-Reply-To: <54CA1A5D.3050801@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.10]
Content-Type: multipart/alternative; boundary="_000_1B502206DFA0C544B7A60469152008633F55D6B7eusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrGLMWRmVeSWpSXmKPExsUyuXSPt65D06kQgxdfTCx+9Nxgtri1dCWr xfS919gdmD3Wdl9l81iy5CeTx4rNKxkDmKO4bFJSczLLUov07RK4Mg4f7GIq2OZXcXTHFOYG xgU+XYycHBICJhLNzR+ZIGwxiQv31rN1MXJxCAkcYZQ4e/gtK4SznFFiafNLNpAqNgE9iY9T f7KD2CIC9RKfjrcwgtjCAukSC9bPZIOIZ0isXvKMBcIuk+j7vgqsnkVAVeLA/0awel4BX4mj Ox5DLWhklXhy/gVQgoODU0BT4sGZBJAaRqCLvp9aA3Yds4C4xK0n86EuFZBYsuc8M4QtKvHy 8T9WCFtJYtLSc6wQ9fkSny61MkHsEpQ4OfMJywRGkVlIRs1CUjYLSdksoCuYga5Yv0sfokRR Ykr3Q3YIW0Oidc5cdmTxBYzsqxg5SotTy3LTjQw3MQIj6pgEm+MOxgWfLA8xCnAwKvHwbjA8 GSLEmlhWXJl7iFGag0VJnLfsysEQIYH0xJLU7NTUgtSi+KLSnNTiQ4xMHJxSDYy5rM8ve93X dTDnqKlW0X5mHdgS77vX1aGTx/n7tvNTF/WZnZx2OuBkmZRnhOyvmKbd9syv9+epB/b1LLLx 7jXe2iYSf3Wa5srpqbZmkUdrG9oLyt76/Ni5+YfD2xuS37TL2OZM2ba2qolxrZHV9560Ax/P eTRN+xWnOqvqsvTNTrONN8ry4pRYijMSDbWYi4oTAd1BXKeJAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/mpls/Y1kfX_C_A5D7RMvM5a1BrHVL_zU>
Subject: Re: [mpls] FW: New Version Notification for draft-farrelll-mpls-opportunistic-encrypt-04.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jan 2015 01:42:03 -0000

Hi Stephen,

In-line [Uma]:

--
Uma C.


-----Original Message-----
From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie]
Sent: Thursday, January 29, 2015 3:33 AM
To: Uma Chunduri; adrian@olddog.co.uk; mpls@ietf.org
Subject: Re: [mpls] FW: New Version Notification for draft-farrelll-mpls-opportunistic-encrypt-04.txt



On 29/01/15 04:03, Uma Chunduri wrote:
>  But the important point here is - packet is getting encrypted and decrypted
>                multiple times;

Sorry, but that is not the case. The packet is encrypted once and decrypted once when following this specification. And the packet can traverse LSRs whilst encrypted without those having to decrypt and then re-encrypt.

[Uma]: I am sure then there is some gap (in my understanding perhaps??), but from the draft I clearly see this-

From Section 3:

                    ----------- .      -----------
                   | Top Label | .    | Label 15  |
                   +-----------+  .   +-----------+
                   |   Label   |   .  | MEL   S=1 |
                   +-----------+    . +-----------+
                   | Label S=1 |     .| Ctrl Word |
                   +-----------+      +-----------+
                   |           |      |           |
                   ~  Payload  ~      ~ Encrypted ~
                   |           |      |           |
                    -----------........-----------

        Figure 1 : The Use of the MEL for Hop-by-Hop Encryption


Each LSR has to decrypt first to get the top label and at the egress swap it without label encrypt with keys for the neighbor, put MEL and send out, right? And the same should happen at each LSR..isn’t it??



The entire e2e path of a packet may cause it to traverse more than one encrypt/decrypt but that is as true for IPsec as it is for this. That is, one can arrange that the endpoints of cryptographic protection are wherever you want.

S.