Re: [tcmtf] Where to talk about security

"Jose Saldana" <jsaldana@unizar.es> Mon, 01 July 2013 14:29 UTC

Return-Path: <jsaldana@unizar.es>
X-Original-To: tcmtf@ietfa.amsl.com
Delivered-To: tcmtf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50B3711E80F6 for <tcmtf@ietfa.amsl.com>; Mon, 1 Jul 2013 07:29:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level:
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wbGxhkAYi6Es for <tcmtf@ietfa.amsl.com>; Mon, 1 Jul 2013 07:29:31 -0700 (PDT)
Received: from ortiz.unizar.es (ortiz.unizar.es [155.210.1.52]) by ietfa.amsl.com (Postfix) with ESMTP id 2DFAB11E80E7 for <tcmtf@ietf.org>; Mon, 1 Jul 2013 07:29:30 -0700 (PDT)
Received: from usuarioPC (gtc1pc12.cps.unizar.es [155.210.158.17]) by ortiz.unizar.es (8.13.8/8.13.8/Debian-3) with ESMTP id r61ETODo005071; Mon, 1 Jul 2013 16:29:24 +0200
From: "Jose Saldana" <jsaldana@unizar.es>
To: "'FERNANDO PASCUAL BLANCO'" <fpb@tid.es>, <tcmtf@ietf.org>, <jltornos@unizar.es>
References: <014b01ce764d$dbdcc0c0$93964240$@unizar.es> <F5EDC35DF914C1428C28E149F10463A29C8B52AD@EX10-MB2-MAD.hi.inet>
In-Reply-To: <F5EDC35DF914C1428C28E149F10463A29C8B52AD@EX10-MB2-MAD.hi.inet>
Date: Mon, 1 Jul 2013 16:29:29 +0200
Organization: Universidad de Zaragoza
Message-ID: <01a001ce7667$6577eb70$3067c250$@unizar.es>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01A1_01CE7678.2901A5D0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQH2ngCFa/PO3nqUW88IgQ9tCzbLwZj/kl2Q
Content-Language: es
X-Mail-Scanned: Criba 2.0 + Clamd & Bogofilter
Subject: Re: [tcmtf] Where to talk about security
X-BeenThere: tcmtf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: jsaldana@unizar.es
List-Id: "Tunneling Compressed Multiplexed Traffic Flows \(TCMTF\) discussion list" <tcmtf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcmtf>
List-Post: <mailto:tcmtf@ietf.org>
List-Help: <mailto:tcmtf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2013 14:29:36 -0000

Hi all,

 

I am improving the “TCMTF reference model” draft, and I have written this
short paragraph to be added to the “security considerations”:

 

The most straightforward option for securing a number of TCM flows

sharing a path is by the use of IPsec [IPsec], when an IP tunnel

scheme is used. Instead of adding a security header to each native

packet, and then compressing and multiplexing, a single IPsec tunnel

can be used in order to secure all the flows together, thus

achieving a better efficiency.

 

 

What do you think?

 

Jose

 

De: FERNANDO PASCUAL BLANCO [mailto:fpb@tid.es] 
Enviado el: lunes, 01 de julio de 2013 15:55
Para: jsaldana@unizar.es; tcmtf@ietf.org
Asunto: Re: [tcmtf] Where to talk about security

 

Hi Jose,

 

Yes, I agree with you. IPSec (in tunnel mode) could be included as another
tunneling protocol adding the security capability to the whole TCM protocol.

 

Best,

 

Fernando Pascual Blanco

Telefónica Global Resources

Network Automation and Dynamization

TECHNOLOGY PEOPLE GROUP

F +34913128779

M +34682005168

fpb@tid.es

 

From: "jsaldana@unizar.es" <jsaldana@unizar.es>
Organization: Universidad de Zaragoza
Reply-To: "jsaldana@unizar.es" <jsaldana@unizar.es>
Date: lunes, 1 de julio de 2013 13:26
To: "tcmtf@ietf.org" <tcmtf@ietf.org>
Subject: [tcmtf] Where to talk about security

 

Hi all.

 

In the “TCM-TF reference model” (
<https://datatracker.ietf.org/doc/draft-saldana-tsvwg-tcmtf/>
https://datatracker.ietf.org/doc/draft-saldana-tsvwg-tcmtf/) we say nothing
in the “security” section. I am preparing an updated version.

 

We could perhaps talk about the use of security tunnels (perhaps IPSEC) as
the most straightforward solution for providing end-to-end security to the
optimized tunnel. What do you think?

 

Jose 

 

 

  _____  


Este mensaje se dirige exclusivamente a su destinatario. Puede consultar
nuestra política de envío y recepción de correo electrónico en el enlace
situado más abajo.
This message is intended exclusively for its addressee. We only send and
receive email on the basis of the terms set out at:
http://www.tid.es/ES/PAGINAS/disclaimer.aspx