Re: [perpass] Fwd: FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
Stephen Kent <kent@bbn.com> Mon, 13 January 2014 15:58 UTC
Return-Path: <kent@bbn.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9023F1AE04F for <perpass@ietfa.amsl.com>; Mon, 13 Jan 2014 07:58:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level:
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wqCbjBe3m9-X for <perpass@ietfa.amsl.com>; Mon, 13 Jan 2014 07:58:26 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 965FA1ADF53 for <perpass@ietf.org>; Mon, 13 Jan 2014 07:58:26 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:59479 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1W2ju3-000NPa-3L for perpass@ietf.org; Mon, 13 Jan 2014 10:58:15 -0500
Message-ID: <52D40D16.7060307@bbn.com>
Date: Mon, 13 Jan 2014 10:58:14 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <mailman.42.1389384009.839.perpass@ietf.org> <52D062BB.1030906@gmail.com> <52D06D63.7070900@cs.tcd.ie>
In-Reply-To: <52D06D63.7070900@cs.tcd.ie>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [perpass] Fwd: FW: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jan 2014 15:58:27 -0000
Stephen, > I think opportunistic IPsec could certainly help yes. I'm not sure if > this use-case is being considered in that work. I think it out to be. Experience has shown that getting all of the details right for a layer 3 security protocol is hard. BTW, MPLS is (lower) layer 3, not layer 2. >> - But even at layer 2, there are existing solutions like WPA or MacSec. >> Can none of them be used (or extended) for this use case and do we >> really have to develop both the bulk encryption and key exchange from >> scratch? > And that too. > > However, my understanding of MPLS is that basically neither IPsec > nor layer 2 crypto are used in many or possibly most cases. My hope, > (and I'd not put it stronger than that for now), is that this might > be a another useful tool in the tool-box that could have a better > chance of being deployed if we develop it with together with MPLS > folks who'd like such a tool. Though I'm sure there'll be MPLS > and other folks who hate the idea as well, we'll see. I suspect you're right that IPsec is not used often in this context. The use of MPLS would be qualitatively different, because it would be offered by an ISP, not by a subscriber. Maybe that would result in more encrypted traffic because ISPs would offer it as a low cost service. > Overall, my goal is to get some crypto that's deployable for > protecting MPLS traffic and I'm not fussed whether that means > re-using a flavour of IPsec nor some L2 stuff from elsewhere, nor > whether it turns out that we need to re-do some things in a way that > works better for our "customers" as in the proposal here. L2 stuff won't work across AS boundaries, unless the MPLS tunnel crosses those boundaries.
- [perpass] Fwd: FW: I-D Action: draft-farrelll-mpl… Stephen Farrell
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Watson Ladd
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Farrell
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Watson Ladd
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Yaron Sheffer
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Farrell
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Paul Wouters
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Leif Johansson
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Yaron Sheffer
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Kent
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Theodore Ts'o
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Kent
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Theodore Ts'o
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Kent
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Stephen Farrell
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Michael Richardson
- Re: [perpass] Fwd: FW: I-D Action: draft-farrelll… Alex Elsayed