[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Pce] Comparison of Encryption vs. Path Key Solutions for theCPSID.



Hi,

Sorry that I haven't been following this too closely.

Jean Louis made a couple of interesting points...

PCE WG members: thanks to provide your feedback on whether:
(1) You think that there is a need for such solution,

Yes definitely, confidentiality is a key requirements in an inter-provider context.

(2) You would prefer one solution (which one and why ?)
(3) You think that there is a need for both

Answer to (2) and (3):

It seems to me that we should end-up with a single solution so as to ease interworking.

Of course, interworking is important and options are generally a Bad Thing (TM), but if the different solutions are beneficial in different environments then we can easily specify support for both options as mandatory. There will, in any case, be a policy decision at an domain border router to say how (and if) to process and encryption/path key.

So, for me, the question is whether there are different environments under which each of the options is preferable.

IMO in an inter-AS MPLS-TE environment without PCEs, the paths
will be loose anyway, so there will not be any confidentiality issue.

I am not sure. The point we are trying to make is that, in order to determine a viable (not to mention optimal) end-to-end path, it will have been necessary to compute the entire path. This may have been achieved privately by independent (albeit cooperating) PCEs.

In this case I think we are agreed that the full path would not be passed back to the ingress PCC for signaling, and so loose hops or strict abstract nodes would be used. But the question is what to do with the computed information so that it is not necessary to recompute when the signaling message enters the domain. One option, as you suggest, is to send it out to the domain border routers in anticipation of a signaling message (and potentially use a key to unlock it), a second option is to retain the information on the PCE and look it up using a key. The third option is to encrypt the path.

It seems to me that the first option requires the second to handle races, memory over-load, etc. So, in fact, the first option is an implementation optimization (but we may still need to make protocol changes to ensure that it is supported).

And my question reduces to:
Are there any circmstances under which ERO encryption is of value to us?

If have some concerns regarding the cost of encryption, particularly for
large paths (we need to think about future P2MP applications with a
large number of hops...).

I am not so sure that the encryption of an ERO is so significant using today's technology. Indeed, one might equally argue that the cost of distributing a large number of paths for multiple destinations to several domain entry points could also be high.

By the way, encryption approaches are really vulnerable
to DoS attacks.

This sounds really important.
What you mean is presumably that we could waste a lot of CPU decrypting an ERO that is bogus. But why is this more of a problem than receiving a bogus LSP setup request that causes us to do extra computation? Or a Path message with a bogus path key that causes us to consult the local PCE for a non-existent path?

Hence I would strongly favor the PKS solution. The optimization
suggested, which consists of sending the computed path segment
to the LSR in an unsolicited manner, just after the computation,
sounds relevant and should be further investigated.

I think this is a valid application, but I would not want to see it made *the* standard technique since it gives me scaling worries for the future.

Thanks,
Adrian