Hiya,

On 05/01/16 10:02, Xuxiaohu wrote:
> Hi Stephen,
> 
> I wonder whether the following explanation is fine to you.

Sorry for the slow response. I didn't manage to find a
reason to justify "forcing" mention of MACsec:-) So, I've
cleared the discuss. Thanks for adding the text you have
on securing inter-DC traffic,

Cheers,
S.

> 
> Best regards,
> Xiaohu
> 
>> -----Original Message-----
>> From: Xuxiaohu
>> Sent: Friday, December 18, 2015 5:27 PM
>> To: 'Stephen Farrell'; Alvaro Retana (aretana); The IESG
>> Cc: draft-ietf-bess-virtual-sub...@ietf.org; bess-cha...@ietf.org;
>> martin.vigour...@alcatel-lucent.com; bess@ietf.org
>> Subject: RE: Stephen Farrell's Discuss on draft-ietf-bess-virtual-subnet-06: 
>> (with
>> DISCUSS and COMMENT)
>>
>>
>>
>>> -----Original Message-----
>>> From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie]
>>> Sent: Friday, December 18, 2015 3:21 PM
>>> To: Xuxiaohu; Alvaro Retana (aretana); The IESG
>>> Cc: draft-ietf-bess-virtual-sub...@ietf.org; bess-cha...@ietf.org;
>>> martin.vigour...@alcatel-lucent.com; bess@ietf.org
>>> Subject: Re: Stephen Farrell's Discuss on
>>> draft-ietf-bess-virtual-subnet-06: (with DISCUSS and COMMENT)
>>>
>>>
>>>
>>> On 18/12/15 06:25, Xuxiaohu wrote:
>>>> Hi Stephen,
>>>>
>>>> Sorry for my late response. The reason that I hesitated to add
>>>> MACsec as an additional example of a strong security mechanism is as
>>>> follows: MACsec is a layer2 encryption mechanism and therefore it
>>>> seems not much suitable to protect IP encapsulated traffic between
>>>> PE routers, unless these PE routers are directly connected to each
>>>> other at Layer2.
>>>
>>> My belief is that such a scenario can be the case for some inter-DC
>>> links. That's not based on real experience though so I'm open to
>>> correction. Hopefully, someone getting this mail knows the answer and
>>> can tell us if MACsec really is worth mentioning. (If not, I'm now
>>> curious enough to try go chase down the
>>> answer:-)
>>>
>>
>> Hi Stephen,
>>
>> The following are some materials related to MACsec and MPLS VPN:
>>
>> https://www.brocade.com/content/dam/common/documents/content-types/f
>> eature-guide/brocade-macsec-fg.pdf
>> http://www.juniper.net/techpubs/en_US/release-independent/nce/information
>> -products/pathway-pages/nce/nce-137-macsec-over-mpls-ccc-configuring.pdf
>>
>> It shows that MACsec is mainly applicable to MPLS L2VPN scenarios such as VLL
>> and VPLS rather than MPLS L3VPN.  Since this draft is based on MPLS L3VPN
>> (i.e., MPLS/BGP IP VPN), it seems that we don't have to mention it as one
>> ADDITIONAL example of a strong security mechanism. Is it fine for you?
>>
>> Best regards,
>> Xiaohu
>>
>>>> If my understand is wrong, would you please explain how to use
>>>> MACsec to protect the IP encapsulated traffic between PE routers
>>>> which are not directly connected? Or would you please provide me a
>>>> link to some RFC which talks about this usage?
>>>
>>> I don't believe there is. At that point you have to go up the stack to
>>> MPLS-OS maybe, or IPsec. But the text does already cover this.
>>>
>>> Cheers,
>>> S.
>>>
>>>
>>>>
>>>> Best regards, Xiaohu
>>>>
>>>>> -----Original Message----- From: Stephen Farrell
>>>>> [mailto:stephen.farr...@cs.tcd.ie] Sent: Tuesday, December 15, 2015
>>>>> 5:00 PM To: Xuxiaohu; Alvaro Retana (aretana); The IESG Cc:
>>>>> draft-ietf-bess-virtual-sub...@ietf.org; bess-cha...@ietf.org;
>>>>> martin.vigour...@alcatel-lucent.com; bess@ietf.org Subject: Re:
>>>>> Stephen Farrell's Discuss on draft-ietf-bess-virtual-subnet-06:
>>>>> (with DISCUSS and COMMENT)
>>>>>
>>>>>
>>>>> Hiya,
>>>>>
>>>>> On 15/12/15 01:19, Xuxiaohu wrote:
>>>>>> Hi Stephen,
>>>>>>
>>>>>> It said "...using a strong security mechanism such as IPsec
>>>>>> [RFC4301]". Here IPsec is just mentioned as an example of a strong
>>>>>> security mechanism. Therefore, it doesn't exclude MACsec.
>>>>>
>>>>> Sure, but...
>>>>>
>>>>> The text that I suggested and that you said seemed good did include
>>>>> MACsec.
>>>>>
>>>>> On 09/12/15 07:47, Xuxiaohu wrote:
>>>>>>> So maybe something more like:
>>>>>>>
>>>>>>> "Inter data-centre traffic often carries highly sensitive
>>>>>>> information
>>>>> at higher
>>>>>>> layers that is not directly understood (parsed) within an egress
>>>>>>> or ingress PE. For example, migrating a VM
>>>>> will often
>>>>>>> mean moving private keys and other sensitive configuration
>>>>> information. For
>>>>>>> this reason inter data-centre traffic SHOULD always be protected
>>>>>>> for both confidentiality and integrity using a strong security
>>>>>>> mechanism such
>>>>> as IPsec [1]
>>>>>>> or MACsec [2] In future it may be feasible to protect that
>>>>>>> traffic
>>>>> within the MPLS
>>>>>>> layer [3] though at the time of writing the mechanism for that is
>>>>>>> not
>>>>> sufficiently
>>>>>>> mature to recommend. Exactly how such security mechanisms are
>>>>> deployed will
>>>>>>> vary from case to case, so securing the inter data-centre traffic
>>>>>>> may
>>>>> or may not
>>>>>>> involve deploying security mechanisms on the ingress/egress PEs
>>>>>>> or
>>>>> further
>>>>>>> "inside" the data centres concerned. Note though that if security
>>>>>>> is
>>>>> not deployed
>>>>>>> on the egress/ingress PEs there is a substantial risk that some
>>>>> sensitive traffic
>>>>>>> may be sent in clear and therefore be vulnerable to pervasive
>>>>> monitoring [4] or
>>>>>>> other attacks."
>>>>>>
>>>>>> Thanks a lot for your suggested text. If nobody object the above
>>>>>> text, I will add it in the next revision.
>>>>>>
>>>>>
>>>>> And indeed you added it all except for MACsec.
>>>>>
>>>>> And my question is not whether MACsec is excluded but rather why it
>>>>> was omitted, when afaik, it is what is most used for securing this
>>>>> particular kind of inter-DC traffic. (At least I believe that
>>>>> MACsec is what's most used there. If not, I'd be glad to know
>>>>> that.)
>>>>>
>>>>> So, why not include MACsec? Did someone object? If so, why? (And
>>>>> can you send a pointer to the WG list where that objection was
>>>>> raised so I can understand it better.)
>>>>>
>>>>> Thanks, S.
>>>>>
>>>>>
>>>>>>
>>>>>> Best regards, Xiaohu
>>>>>>
>>>>>>> -----Original Message----- From: Stephen Farrell
>>>>>>> [mailto:stephen.farr...@cs.tcd.ie] Sent: Monday, December 14,
>>>>>>> 2015 9:47 PM To: Alvaro Retana (aretana); Xuxiaohu; The IESG
>>>>>>> Cc: draft-ietf-bess-virtual-sub...@ietf.org;
>>>>>>> bess-cha...@ietf.org; martin.vigour...@alcatel-lucent.com;
>>>>>>> bess@ietf.org Subject: Re: Stephen Farrell's Discuss on
>>>>>>> draft-ietf-bess-virtual-subnet-06: (with DISCUSS and COMMENT)
>>>>>>>
>>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> Can someone say why the mention of MACsec wasn't included? As I
>>>>>>> understand it, MACsec is what's mostly usable for inter-DC
>>>>>>> security so omitting it seems like a bad idea (or perhaps I'm
>>>>>>> misinformed)
>>>>>>>
>>>>>>> Thanks, S.
>>>>>>>
>>>>>>> On 14/12/15 13:34, Alvaro Retana (aretana) wrote:
>>>>>>>> Stephen:
>>>>>>>>
>>>>>>>> Hi!
>>>>>>>>
>>>>>>>> Xiaohu posted an update that we hope addresses your concerns.
>>>>>>>> Pelase take a look.
>>>>>>>>
>>>>>>>>
>>>>>>>> Thanks!
>>>>>>>>
>>>>>>>> Alvaro.
>>>>>>>>
>>>>>>>>

_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess

Reply via email to