Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt

Stephen Farrell <stephen.farrell@cs.tcd.ie> Thu, 09 January 2014 18:33 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 215131AE075 for <mpls@ietfa.amsl.com>; Thu, 9 Jan 2014 10:33:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.438
X-Spam-Level:
X-Spam-Status: No, score=-2.438 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.538] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7iJUeGawh7CO for <mpls@ietfa.amsl.com>; Thu, 9 Jan 2014 10:33:10 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 857151AE04F for <mpls@ietf.org>; Thu, 9 Jan 2014 10:33:10 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 8DD51BE47; Thu, 9 Jan 2014 18:32:59 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z5O0U5VO+ggW; Thu, 9 Jan 2014 18:32:58 +0000 (GMT)
Received: from [10.87.48.14] (unknown [86.41.58.242]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 1EF4BBE3F; Thu, 9 Jan 2014 18:32:58 +0000 (GMT)
Message-ID: <52CEEB4F.2010609@cs.tcd.ie>
Date: Thu, 09 Jan 2014 18:32:47 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: erosen@cisco.com, adrian@olddog.co.uk
References: <23487.1389288863@erosen-linux>
In-Reply-To: <23487.1389288863@erosen-linux>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: mpls@ietf.org
Subject: Re: [mpls] FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 18:33:13 -0000

Hi Eric,

On 01/09/2014 05:34 PM, Eric Rosen wrote:
>> wondering whether anything could be done to help protect against various
>> types of bulk surveillance achieved by tapping entire links
> 
> Aren't there link layer encryption schemes that protect the confidentiality
> of all traffic on the link?  I don't see why one would want an MPLS-specific
> protocol for  "single hop" encryption.

Are those widely used? I'd be interested to know. If not, then
this tool as another tool in the toolbox may be of use.

And those don't address the end-end (or edge-edge) cases, right?

> I also don't understand the need for MPLS-specific "end-end" (probably
> "edge-edge" is what is meant) encryption, as one can always send traffic
> via IPsec.  

My understanding is that not all traffic being sent in an LSP is
IP, is that wrong? (I'm told end-end is right also for an LSP, but
am happy to admit my ignorance of terminology here.)

> So, just what is the unsolved problem addressed by this draft?  (I was going
> to ask whether RFC 5566 is relevant at all, but first it would be good to
> get a clear statement of the scenarios that are being addressed.)

I guess I'd refer to draft-farrell-perpass-attack and
draft-barnes-pervasive-problem. I realise you're not a big
fan of at least the first one there.

> BTW, most of the draft seems to be about encryption and/or key distribution,
> which of course is out of scope for this WG.  Surely the security ADs will
> not tolerate having the MPLS WG invent new key distribution protocols.

Heh. This one is happy. The other was was too when he had a read
of this. If the draft looks like its attractive and useful then we
can figure out how to process it so its handled properly. (I also
forwarded Adrian's note to the perpass list - this might also be
useful as a template for how to add OE to other protocols.) But
we'll for sure get the right review.

Cheers,
S.


>