Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt

Stephen Farrell <stephen.farrell@cs.tcd.ie> Thu, 09 January 2014 14:18 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A2F91AE325 for <mpls@ietfa.amsl.com>; Thu, 9 Jan 2014 06:18:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.438
X-Spam-Level:
X-Spam-Status: No, score=-2.438 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.538] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I3dj7F9ag_v8 for <mpls@ietfa.amsl.com>; Thu, 9 Jan 2014 06:18:31 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 031B31AE306 for <mpls@ietf.org>; Thu, 9 Jan 2014 06:18:30 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 35AE6BE54; Thu, 9 Jan 2014 14:18:21 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BPiHt82i9h+o; Thu, 9 Jan 2014 14:18:21 +0000 (GMT)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 10CBEBE53; Thu, 9 Jan 2014 14:18:21 +0000 (GMT)
Message-ID: <52CEAFAC.8010901@cs.tcd.ie>
Date: Thu, 09 Jan 2014 14:18:20 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: adrian@olddog.co.uk, mark.tinka@seacom.mu, mpls@ietf.org
References: <20140109114335.11656.57445.idtracker@ietfa.amsl.com> <01be01cf0d31$13fdea40$3bf9bec0$@olddog.co.uk> <201401091514.32953.mark.tinka@seacom.mu> <022b01cf0d45$5566f8f0$0034ead0$@olddog.co.uk>
In-Reply-To: <022b01cf0d45$5566f8f0$0034ead0$@olddog.co.uk>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Subject: Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 14:18:33 -0000

On 01/09/2014 02:16 PM, Adrian Farrel wrote:
> Hi Mark,
> 
> Thanks for the rapid response.
> 
> I leave some of your questions for wider discussion and just respond to a few of
> them...
> 
>> As an operator, my rather high level concerns are:
>>
>> 	- What impact does this have on linear data plane
>> 	  throughput?
> 
> TBD
> Some people have noted that per hop encryption/decryption might be an issue.
> Others have countered that ETH h/w can already handle MACsec at line rate.
> e2e encryption seems (to me) to be less likely to be an issue.

I'm not a h/w person myself, so take this with salt, but [1]
indicates they got 30Gbps with one Xilinx Virtex5 FPGA and
AES-GCM is designed to be parallelised.

S.

[1] http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6674921


> 
>> 	- What impact does this have on data plane
>> 	  operational complexity?
>>
>> 	- What impact does this have on the control plane.
> 
> AFAIK, none. The I-D doesn't touch the control plane.
> 
>> 	- How efficient is key management on a global level,
>> 	  and what is the practical impact to day-to-day
>> 	  operations, for situations where MPLS paths cross
>> 	  distinct routing domains?
> 
> The point of OE is that there is no key management on a global level.
> It is, of course, still relatively rare that LSPs cross distinct routing
> domains, but when they do, this need not have any impact on OE.
> 
>> 	- What kind of backward compatibility is there for
>> 	  domains that do not participate, or for nodes
>> 	  within the same domain that do not participate, as
>> 	  this has an impact on overall domain capability
>> 	  (i.e., cost).
> 
> This is covered in the document (although maybe not in enough detail?).
> Transit nodes (and so domains) do not need to be aware of the encryption which
> is below the top labels and potentially below the entropy label.
> End nodes that do not support will, erm, not support :-)
> 
> Thanks for the early thoughts and I encourage an in-depth read and some more
> pontifications.
> 
> Adrian
>