Ali,

I am writing to follow up on our discussion during the IETF 119 BESS WG session 
regarding the draft-wang-bess-secservice. As you may recall, you endorsed 
Option 1 as the preferable approach for using SECURE-EVPN mechanism to encrypt 
selective SRv6 Flows into the Secure EVPN framework.
Option 1: Merge with Secure EVPN, directly incorporating the section into the 
main body of the document.
Additionally, consider adding a description of the necessary encapsulation 
methods in Section 9 and extending the discussion of new tunnel types in 
Section 10 to accommodate this feature.

Proposed Integration: I suggest adding a new subsection, "Encrypting Selective 
SRv6 Flows," to Section 3 of the Secure EVPN draft. This addition would detail 
the use case and requirements for selectively applying IPsec encryption to SRv6 
data flows within NSP-managed networks, addressing the need for heightened 
security measures for sensitive data.

The proposed content for the subsection "Encrypting Selective SRv6 Flows" would 
include:

Scenario Description: Highlighting environments where SRv6 is deployed and the 
types of data flows that require enhanced security measures.
Implementation Strategy: Outlining the steps for implementing IPsec encryption, 
including flow identification, policy configuration, and the encryption 
mechanism itself.
Security Considerations: Discussing the added complexity and necessary 
management adjustments to maintain performance and security.
Benefits: Explaining how this approach secures sensitive information and 
ensures compliance with various regulatory requirements.

Here is the wording proposal. You can modify them to fit the SECURE-EVPN style.

3.6 Encrypting Selective SRv6 Flows
While a Network Service Provider (NSP) managed SRv6 domain is often considered 
a trusted and secure domain as detailed in RFC 8754, RFC 8402, and RFC 8986, 
certain scenarios require an enhanced security model. Particularly in cases 
where data flows carry sensitive or confidential information, there is a 
compelling need for additional security measures. Encrypting selective SRv6 
flows caters to this need by providing robust protection even within a network 
environment presumed to be secure.

Scenario Description
In environments where SRv6 is deployed, data flows might include transactions 
requiring confidentiality, integrity, and authenticity assurances that exceed 
standard network security measures. Examples include financial transactions, 
personal data transmissions subject to privacy regulations, or corporate 
communications involving sensitive strategic content. In such cases, 
selectively encrypting specific SRv6 flows ensures that even if network 
breaches occur, the encrypted data remains secure.

Implementation Strategy
The implementation of IPsec for encrypting selective SRv6 flows involves the 
following steps:
1.       Flow Identification: Define criteria for selecting which SRv6 flows 
require encryption. This could be based on the type of data, the 
source/destination of the flows, or preconfigured security policies.
2.       Policy Configuration: Configure security policies that dictate the 
parameters for encryption, such as the algorithms used, the keys to be 
employed, and the duration of key validity. These policies are applied 
specifically to the identified SRv6 flows that require encryption.
3.       Encryption Mechanism: Utilize IPsec in transport mode to encrypt the 
payload of identified SRv6 packets. The SRH (Segment Routing Header) remains 
unencrypted to allow for the routing of the packet, while the payload is 
encrypted, ensuring the confidentiality and integrity of the data.

Security Considerations
Encrypting selective SRv6 flows introduces additional complexity into the 
network management. It requires careful coordination between network security 
policies and the dynamic requirements of SRv6 routing. Additionally, the 
overhead introduced by encryption needs to be evaluated to ensure that it does 
not impact the network performance adversely. Effective monitoring and 
management are crucial to detect and respond to security incidents in a timely 
manner.

Benefits
This approach enhances data security by protecting sensitive information from 
potential eavesdropping and tampering. It also provides compliance with various 
regulatory requirements for data protection, offering an added layer of 
security without encrypting all network traffic, which can be resource 
intensive.
________________________________
This addition will fit seamlessly into your existing document structure under 
Section 3, providing a detailed examination of how IPsec can be used to enhance 
the security of selective SRv6 flows in a network environment managed by NSPs.



I look forward to your feedback on this proposal and am eager to assist in any 
drafting or revisions needed to facilitate this integration. Once we align on 
the approach, I will provide detailed text for adding a subsection in section 9 
to describe encapsulation and adding extension of new tunnel type in section 10.

Thank you for considering this enhancement. I believe it will make a 
substantial contribution to the deployment and effectiveness of SECURE-EVPN by 
addressing critical security needs in SRv6 networks.

Linda
_______________________________________________
BESS mailing list -- bess@ietf.org
To unsubscribe send an email to bess-le...@ietf.org

Reply via email to