
From jakob.heitz@ericsson.com  Mon Jul  2 23:44:59 2012
Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BE1111E8140 for <l2vpn@ietfa.amsl.com>; Mon,  2 Jul 2012 23:44:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.471
X-Spam-Level: 
X-Spam-Status: No, score=-6.471 tagged_above=-999 required=5 tests=[AWL=0.127,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tZbQvIAPmHjk for <l2vpn@ietfa.amsl.com>; Mon,  2 Jul 2012 23:44:59 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id D9FE411E8144 for <l2vpn@ietf.org>; Mon,  2 Jul 2012 23:44:58 -0700 (PDT)
Received: from eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id q636j4ae020700 for <l2vpn@ietf.org>; Tue, 3 Jul 2012 01:45:05 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.215]) by eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) with mapi; Tue, 3 Jul 2012 02:44:59 -0400
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Tue, 3 Jul 2012 02:44:57 -0400
Subject: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1Y51xRj29YAAO7TbObPRz4rQCOXQ==
Message-ID: <7309FCBCAE981B43ABBE69B31C8D213924383B2B2D@EUSAACMS0701.eamcs.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_7309FCBCAE981B43ABBE69B31C8D213924383B2B2DEUSAACMS0701e_"
MIME-Version: 1.0
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 06:44:59 -0000

--_000_7309FCBCAE981B43ABBE69B31C8D213924383B2B2DEUSAACMS0701e_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Is there a way to age out a MAC address in EVPN?
Does the advertising MES just withdraw it when it ages out?
Is there a possibility to add an age to the MAC NLRI?
Or put an age into a BGP extended community?

--
Jakob Heitz.



--_000_7309FCBCAE981B43ABBE69B31C8D213924383B2B2DEUSAACMS0701e_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"Lucida Console, monospace" size=3D"2">
<div><font color=3D"#800080">Is there a way to age out a MAC address in EVP=
N?</font></div>
<div><font color=3D"#800080">Does the advertising MES just withdraw it when=
 it ages out?</font></div>
<div><font color=3D"#800080">Is there a possibility to add an age to the MA=
C NLRI?</font></div>
<div><font color=3D"#800080">Or put an age into a BGP extended community?</=
font></div>
<div><font color=3D"#800080">&nbsp;</font></div>
<div><font face=3D"Arial, sans-serif">--</font></div>
<div><font face=3D"Arial, sans-serif">Jakob Heitz.</font></div>
<div><font face=3D"Arial, sans-serif" color=3D"#800080">&nbsp;</font></div>
<div><font color=3D"#800080">&nbsp;</font></div>
</font>
</body>
</html>

--_000_7309FCBCAE981B43ABBE69B31C8D213924383B2B2DEUSAACMS0701e_--

From wim.henderickx@alcatel-lucent.com  Tue Jul  3 00:11:24 2012
Return-Path: <wim.henderickx@alcatel-lucent.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9189E21F8607 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 00:11:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.248
X-Spam-Level: 
X-Spam-Status: No, score=-10.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cbPvlUlw1bwg for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 00:11:23 -0700 (PDT)
Received: from smail6.alcatel.fr (smail6.alcatel.fr [64.208.49.42]) by ietfa.amsl.com (Postfix) with ESMTP id 175C121F855E for <l2vpn@ietf.org>; Tue,  3 Jul 2012 00:11:15 -0700 (PDT)
Received: from FRMRSSXCHHUB03.dc-m.alcatel-lucent.com (FRMRSSXCHHUB03.dc-m.alcatel-lucent.com [135.120.45.63]) by smail6.alcatel.fr (8.14.3/8.14.3/ICT) with ESMTP id q637B3xX031377 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Tue, 3 Jul 2012 09:11:19 +0200
Received: from FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com ([135.120.45.43]) by FRMRSSXCHHUB03.dc-m.alcatel-lucent.com ([135.120.45.63]) with mapi; Tue, 3 Jul 2012 09:11:14 +0200
From: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
To: Jakob Heitz <jakob.heitz@ericsson.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Tue, 3 Jul 2012 09:11:10 +0200
Subject: RE: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1Y51xRj29YAAO7TbObPRz4rQCOXQAA401Q
Message-ID: <14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
References: <7309FCBCAE981B43ABBE69B31C8D213924383B2B2D@EUSAACMS0701.eamcs.ericsson.se>
In-Reply-To: <7309FCBCAE981B43ABBE69B31C8D213924383B2B2D@EUSAACMS0701.eamcs.ericsson.se>
Accept-Language: nl-NL, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: nl-NL, en-US
Content-Type: multipart/alternative; boundary="_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06FRMRSSXCHMBSB_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.69 on 155.132.188.84
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 07:11:25 -0000

--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06FRMRSSXCHMBSB_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Aging is done in the same way as VPLS. You have a local age timer and if it=
 expires the MAC address is withdrawn from the EVPN.

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of J=
akob Heitz
Sent: dinsdag 3 juli 2012 8:45
To: l2vpn@ietf.org
Subject: EVPN: MAC age

Is there a way to age out a MAC address in EVPN?
Does the advertising MES just withdraw it when it ages out?
Is there a possibility to add an age to the MAC NLRI?
Or put an age into a BGP extended community?

--
Jakob Heitz.



--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06FRMRSSXCHMBSB_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUI=
V=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"><meta name=3DG=
enerator content=3D"Microsoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Lucida Console";
	panose-1:2 11 6 9 4 5 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.emailquote, li.emailquote, div.emailquote
	{mso-style-name:emailquote;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:1.0pt;
	border:none;
	padding:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Aging is =
done in the same way as VPLS. You have a local age timer and if it expires =
the MAC address is withdrawn from the EVPN.<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div style=3D'border:n=
one;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=3DMs=
oNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif=
"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sa=
ns-serif"'> l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] <b>On Be=
half Of </b>Jakob Heitz<br><b>Sent:</b> dinsdag 3 juli 2012 8:45<br><b>To:<=
/b> l2vpn@ietf.org<br><b>Subject:</b> EVPN: MAC age<o:p></o:p></span></p></=
div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNorm=
al><span style=3D'font-size:10.0pt;font-family:"Lucida Console";color:purpl=
e'>Is there a way to age out a MAC address in EVPN?</span><span style=3D'fo=
nt-size:10.0pt;font-family:"Lucida Console"'><o:p></o:p></span></p></div><d=
iv><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Lucida=
 Console";color:purple'>Does the advertising MES just withdraw it when it a=
ges out?</span><span style=3D'font-size:10.0pt;font-family:"Lucida Console"=
'><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'font=
-size:10.0pt;font-family:"Lucida Console";color:purple'>Is there a possibil=
ity to add an age to the MAC NLRI?</span><span style=3D'font-size:10.0pt;fo=
nt-family:"Lucida Console"'><o:p></o:p></span></p></div><div><p class=3DMso=
Normal><span style=3D'font-size:10.0pt;font-family:"Lucida Console";color:p=
urple'>Or put an age into a BGP extended community?</span><span style=3D'fo=
nt-size:10.0pt;font-family:"Lucida Console"'><o:p></o:p></span></p></div><d=
iv><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Lucida=
 Console";color:purple'>&nbsp;</span><span style=3D'font-size:10.0pt;font-f=
amily:"Lucida Console"'><o:p></o:p></span></p></div><div><p class=3DMsoNorm=
al><span style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'>--</sp=
an><span style=3D'font-size:10.0pt;font-family:"Lucida Console"'><o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span style=3D'font-size:10.0pt=
;font-family:"Arial","sans-serif"'>Jakob Heitz.</span><span style=3D'font-s=
ize:10.0pt;font-family:"Lucida Console"'><o:p></o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","sa=
ns-serif";color:purple'>&nbsp;</span><span style=3D'font-size:10.0pt;font-f=
amily:"Lucida Console"'><o:p></o:p></span></p></div><div><p class=3DMsoNorm=
al><span style=3D'font-size:10.0pt;font-family:"Lucida Console";color:purpl=
e'>&nbsp;</span><span style=3D'font-size:10.0pt;font-family:"Lucida Console=
"'><o:p></o:p></span></p></div></div></body></html>=

--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06FRMRSSXCHMBSB_--

From Alexander.Vainshtein@ecitele.com  Tue Jul  3 01:19:46 2012
Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADAD021F87C7 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 01:19:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.201
X-Spam-Level: 
X-Spam-Status: No, score=-5.201 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J-fWI7jFnFDg for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 01:19:44 -0700 (PDT)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.34]) by ietfa.amsl.com (Postfix) with ESMTP id EA1F321F85AC for <l2vpn@ietf.org>; Tue,  3 Jul 2012 01:19:43 -0700 (PDT)
Received: from [85.158.138.51:43188] by server-7.bemta-3.messagelabs.com id 41/D5-10113-62BA2FF4; Tue, 03 Jul 2012 08:19:50 +0000
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-9.tower-174.messagelabs.com!1341303590!30789112!1
X-Originating-IP: [168.87.1.157]
X-StarScan-Version: 6.5.10; banners=-,-,-
Received: (qmail 31402 invoked from network); 3 Jul 2012 08:19:50 -0000
Received: from unknown (HELO fridlpvsb003.ecitele.com) (168.87.1.157) by server-9.tower-174.messagelabs.com with SMTP; 3 Jul 2012 08:19:50 -0000
X-AuditID: a8571403-b7eff6d000003899-b1-4ff2ab188de9
Received: from FRGRWPVCH001.ecitele.com (Unknown_Domain [10.1.18.35]) by fridlpvsb003.ecitele.com (Symantec Messaging Gateway) with SMTP id F1.24.14489.81BA2FF4; Tue,  3 Jul 2012 10:19:36 +0200 (CEST)
Received: from FRIDWPPMB001.ecitele.com ([169.254.3.23]) by FRGRWPVCH001.ecitele.com ([10.1.18.35]) with mapi id 14.01.0339.001; Tue, 3 Jul 2012 10:19:49 +0200
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>, Jakob Heitz <jakob.heitz@ericsson.com>
Subject: RE: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1Y51xRj29YAAO7TbObPRz4rQCOXQAA401QAAIi1fA=
Date: Tue, 3 Jul 2012 08:19:48 +0000
Message-ID: <F9336571731ADE42A5397FC831CEAA020975B0@FRIDWPPMB001.ecitele.com>
References: <7309FCBCAE981B43ABBE69B31C8D213924383B2B2D@EUSAACMS0701.eamcs.ericsson.se> <14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
In-Reply-To: <14C7F4F06DB5814AB0DE29716C4F6D6702DF8FAC06@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.4.42.92]
Content-Type: multipart/alternative; boundary="_000_F9336571731ADE42A5397FC831CEAA020975B0FRIDWPPMB001ecite_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Brightmail-Tracker: H4sIAAAAAAAAA3VTWUwTURT1dboM2DFDrfCoxExeMBoVUlxCXUr8IcEYUwSNS4I4dp7thHZa OxWpHwYFjCIoxg8QQwBBgyIQ+UDiWhFNwLoEd41LAI2iJoIirsQZBpDEOF/n3nPuufe9d4ck DHk6E8kLfuwTWBfShqvDwSRTHKwfsJmLQnMt3Qeuqyw9X9t0lmM937TLiZSCN5c0KT8GH2hT amu/q1KJjblgGSsIHj/rxwyHRbsVpfr4bNYeQAzPWVECYrwu1o7dWPBbEev1YoFDSeHMP98y ScYLDBbsHo4XHFa0It0WZ7EsWhyXgJLWOHmRwXFulncxbiyKrAMzUkaeW+A2NxLOvsFSwtu+ Iaf/4SuQC4pTC0EYCemFsKy0T6fgSHj3RZO2EISTBroTwIpnuaNBjRS8DqlllZa2wub651oZ G2kenjhfopIxQc+E+c2XgYyn0ia4P/RVp2imw8+hQrWCl8Cyw72ShiTVdCz8+XumnKboVfBE 11ud0qsBwJdPGkb0YfRmGPrQPeIPpOmGOs+M9oqCT3srVcrUNKy9eIdQ8DT4rmdYo+AZcM+p +zpF74FNwWqN0iwCdhztVSuaaHi17rG6BESWT7Atn1BSPqFEyc+DVRcGtAqeC09WvyfGcCjY o5qYrwK60wBu9fGcy5stbjGbF8RjO+/HLhxv97ibgbRJdeuMRCv4cii+DdAkQHoqeGTAZtCw 2WLA3QaiSRWaRq2qk1JTtni4gJMVnZm+7S4stgFIEshIbWrvtxkojg3sxD7PGJUsXe5hwjTZ 7pHf3p+5wGz+f4CiqKa0JJuBdkjbmYWxF/vGfGJIEkHKe1pqH+HDDpyzlXf5/9IqMkweQy+N kS9rKNHLukXeofCdINoURWXKBC0Tzu3CeG0fiJIOO5VKk1m9tKHjVX2SoUoyFGpGDKU/Zpwy 5YJt/VfbYw6tQ2U7rtRm3N49vP5jwrWCV9ZvlbNu6TeE3AYjXjunYW1Wy775NXuzHq2nb+ip iMtLjDeLOmN/3cvRoNXHS+mlFzMqDg4PBR+9aJwlrkgODp2b3bWwK/CppvFg6c/6XYN5sSW/ W85Wtp7nVtp1r5nq9MSO1MSO1n27ih8mIrXoZBPmED6R/QPoT2ZNFgQAAA==
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 08:19:47 -0000

--_000_F9336571731ADE42A5397FC831CEAA020975B0FRIDWPPMB001ecite_
Content-Type: text/plain; charset="us-ascii"
content-transfer-encoding: quoted-printable

Hi all,
I have doubts regarding the statement in Wim's message "Aging is done in the=
 same way as VPLS."

AFAIK VPLS implementations that learn MCA addresses from traffic typically m=
aintain "usage state" for learned MAC addresses i their data path so that on=
ly MAC addresses that have learned once but not seen for a long time are age=
d out.

To the best of my understanding, in EVPN this would still work for MAC addre=
sses learned from the local ACs, but not for MAC addresses that have been in=
stalled via the control plane. Or do I miss something substantial here?

Regards,
     Sasha


Regards,
     Sasha

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of He=
nderickx, Wim (Wim)
Sent: Tuesday, July 03, 2012 10:11 AM
To: Jakob Heitz; l2vpn@ietf.org
Subject: RE: EVPN: MAC age

Aging is done in the same way as VPLS. You have a local age timer and if it=
 expires the MAC address is withdrawn from the EVPN.

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of Ja=
kob Heitz
Sent: dinsdag 3 juli 2012 8:45
To: l2vpn@ietf.org
Subject: EVPN: MAC age

Is there a way to age out a MAC address in EVPN?
Does the advertising MES just withdraw it when it ages out?
Is there a possibility to add an age to the MAC NLRI?
Or put an age into a BGP extended community?

--
Jakob Heitz.



This e-mail message is intended for the recipient only and contains informat=
ion which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If yo=
u have received this transmission in error, please inform us by e-mail, phon=
e or fax, and then delete the original and all copies thereof.


--_000_F9336571731ADE42A5397FC831CEAA020975B0FRIDWPPMB001ecite_
Content-Type: text/html; charset="us-ascii"
content-transfer-encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" xm=
lns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http://w=
ww.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Lucida Console";
	panose-1:2 11 6 9 4 5 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.emailquote, li.emailquote, div.emailquote
	{mso-style-name:emailquote;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:1.0pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi all,<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I have doubts regarding the=
 statement in Wim&#8217;s message &#8220;</span><span style=3D"font-size:11.=
0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ag=
ing is done
 in the same way as VPLS.</span><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&#8221;<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">AFAIK VPLS implementations=
 that learn MCA addresses from traffic typically maintain &#8220;usage state=
&#8221; for learned MAC addresses i their data path so that only MAC
 addresses that have learned once but not seen for a long time are aged out.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">To the best of my understan=
ding, in EVPN this would still work for MAC addresses learned from the local=
 ACs, but not for MAC addresses that have been installed
 via the control plane. Or do I miss something substantial here?<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; Sa=
sha<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; Sa=
sha<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm 4=
.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0=
cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot;=
Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-siz=
e:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> l2vpn-bounc=
es@ietf.org [mailto:l2vpn-bounces@ietf.org]
<b>On Behalf Of </b>Henderickx, Wim (Wim)<br>
<b>Sent:</b> Tuesday, July 03, 2012 10:11 AM<br>
<b>To:</b> Jakob Heitz; l2vpn@ietf.org<br>
<b>Subject:</b> RE: EVPN: MAC age<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Aging is done in the same w=
ay as VPLS. You have a local age timer and if it expires the MAC address is=
 withdrawn from the EVPN.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p=
>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0=
cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot;=
Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-siz=
e:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> l2vpn-bounc=
es@ietf.org [mailto:l2vpn-bounces@ietf.org]
<b>On Behalf Of </b>Jakob Heitz<br>
<b>Sent:</b> dinsdag 3 juli 2012 8:45<br>
<b>To:</b> l2vpn@ietf.org<br>
<b>Subject:</b> EVPN: MAC age<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">Is there a way to age out a MAC address in E=
VPN?</span><span style=3D"font-size:10.0pt;font-family:&quot;Lucida Console&=
quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">Does the advertising MES just withdraw it wh=
en it ages out?</span><span style=3D"font-size:10.0pt;font-family:&quot;Luci=
da Console&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">Is there a possibility to add an age to the=
 MAC NLRI?</span><span style=3D"font-size:10.0pt;font-family:&quot;Lucida Co=
nsole&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">Or put an age into a BGP extended community?=
</span><span style=3D"font-size:10.0pt;font-family:&quot;Lucida Console&quot=
;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">&nbsp;</span><span style=3D"font-size:10.0pt=
;font-family:&quot;Lucida Console&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;">--</span><span style=3D"font-size:10.0pt;fo=
nt-family:&quot;Lucida Console&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;">Jakob Heitz.</span><span style=3D"font-size=
:10.0pt;font-family:&quot;Lucida Console&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:purple">&nbsp;</span><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Lucida Console&quot;"><o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Luc=
ida Console&quot;;color:purple">&nbsp;</span><span style=3D"font-size:10.0pt=
;font-family:&quot;Lucida Console&quot;"><o:p></o:p></span></p>
</div>
</div>
</div>
<p>This e-mail message is intended for the recipient only and contains infor=
mation which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If=
 you have received this transmission in error, please inform us by e-mail, p=
hone or fax, and then delete the original and all copies thereof.
</p>
</body>
</html>

--_000_F9336571731ADE42A5397FC831CEAA020975B0FRIDWPPMB001ecite_--

From wim.henderickx@alcatel-lucent.com  Tue Jul  3 01:29:28 2012
Return-Path: <wim.henderickx@alcatel-lucent.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39EAA21F87C7 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 01:29:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.998
X-Spam-Level: 
X-Spam-Status: No, score=-9.998 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, MIME_BAD_LINEBREAK=0.5, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vk4RJTPoqh-y for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 01:29:27 -0700 (PDT)
Received: from smail3.alcatel.fr (smail3.alcatel.fr [64.208.49.56]) by ietfa.amsl.com (Postfix) with ESMTP id 0C75921F87C4 for <l2vpn@ietf.org>; Tue,  3 Jul 2012 01:29:26 -0700 (PDT)
Received: from FRMRSSXCHHUB01.dc-m.alcatel-lucent.com (FRMRSSXCHHUB01.dc-m.alcatel-lucent.com [135.120.45.61]) by smail3.alcatel.fr (8.14.3/8.14.3/ICT) with ESMTP id q638TH96016085 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Tue, 3 Jul 2012 10:29:32 +0200
Received: from FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com ([135.120.45.43]) by FRMRSSXCHHUB01.dc-m.alcatel-lucent.com ([135.120.45.61]) with mapi; Tue, 3 Jul 2012 10:28:40 +0200
From: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
To: "'Alexander.Vainshtein@ecitele.com'" <Alexander.Vainshtein@ecitele.com>, "'jakob.heitz@ericsson.com'" <jakob.heitz@ericsson.com>
Date: Tue, 3 Jul 2012 10:28:38 +0200
Subject: Re: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1Y51xRj29YAAO7TbObPRz4rQCOXQAA401QAAIi1fAAAJjw7g==
Message-ID: <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
In-Reply-To: <F9336571731ADE42A5397FC831CEAA020975B0@FRIDWPPMB001.ecitele.com>
Accept-Language: nl-NL, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: nl-NL, en-US
Content-Type: multipart/alternative; boundary="_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DDFRMRSSXCHMBSB_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.69 on 155.132.188.83
Cc: "'l2vpn@ietf.org'" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 08:29:28 -0000

--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DDFRMRSSXCHMBSB_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DDFRMRSSXCHMBSB_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DDFRMRSSXCHMBSB_--

From Alexander.Vainshtein@ecitele.com  Tue Jul  3 02:12:43 2012
Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9640521F87DF for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 02:12:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.899
X-Spam-Level: 
X-Spam-Status: No, score=-5.899 tagged_above=-999 required=5 tests=[AWL=0.698,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bTlRMy2cqejI for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 02:12:42 -0700 (PDT)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.34]) by ietfa.amsl.com (Postfix) with ESMTP id 0E5D321F86DB for <l2vpn@ietf.org>; Tue,  3 Jul 2012 02:12:39 -0700 (PDT)
Received: from [85.158.138.51:22797] by server-11.bemta-3.messagelabs.com id D8/C7-02904-E87B2FF4; Tue, 03 Jul 2012 09:12:46 +0000
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-10.tower-174.messagelabs.com!1341306765!26711160!1
X-Originating-IP: [168.87.1.157]
X-StarScan-Version: 6.5.10; banners=-,-,-
Received: (qmail 28834 invoked from network); 3 Jul 2012 09:12:46 -0000
Received: from unknown (HELO fridlpvsb003.ecitele.com) (168.87.1.157) by server-10.tower-174.messagelabs.com with SMTP; 3 Jul 2012 09:12:46 -0000
X-AuditID: a8571403-b7eff6d000003899-eb-4ff2b77f6d01
Received: from FRIDWPPCH002.ecitele.com (Unknown_Domain [10.1.16.53]) by fridlpvsb003.ecitele.com (Symantec Messaging Gateway) with SMTP id 54.34.14489.F77B2FF4; Tue,  3 Jul 2012 11:12:31 +0200 (CEST)
Received: from FRIDWPPMB001.ecitele.com ([169.254.3.23]) by FRIDWPPCH002.ecitele.com ([10.1.16.53]) with mapi id 14.01.0339.001; Tue, 3 Jul 2012 11:12:44 +0200
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
Subject: RE: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1Y51xRj29YAAO7TbObPRz4rQCOXQAA401QAAIi1fAAAJjw7gABhkqA
Date: Tue, 3 Jul 2012 09:12:43 +0000
Message-ID: <F9336571731ADE42A5397FC831CEAA020975DE@FRIDWPPMB001.ecitele.com>
References: <F9336571731ADE42A5397FC831CEAA020975B0@FRIDWPPMB001.ecitele.com> <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
In-Reply-To: <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.4.42.92]
Content-Type: multipart/alternative; boundary="_000_F9336571731ADE42A5397FC831CEAA020975DEFRIDWPPMB001ecite_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Brightmail-Tracker: H4sIAAAAAAAAA3VTa2wMURh1Z7a70+rUWGWvJTrGI0haux7JSrrlD+qVNioRRJjO3O5O7M6u nW2piCzJEu2P1it0qUraxDOWepR6hA1aq4l3NEK1FknrEWmLJYI7O1QTMb/OfN/5zjl35rsU aawwmClJ9iOfzLs4fYouBQwwZwYauvMsvTfMtpflNwlb7HPEYNsfi+tnkbnBN1eScr99eqzP rav7SuSTywMgm5dlj5/3I1ZEimDn8n1SCS+Ucqwk2jkrx3pdvIDcSPbbOd7rRbLI5aSw/zzZ mCbJLJIFjyjJDjs3ryAv02abPiPTyuUscUoKizLdvORi3UhReAdicUXNLYurT5LOvR+jhPdk LVjfHa8kAyBQA8pAMgWZafBJU5jQ8DB4ry2sV7GRiQL4szWjDKRgXAvgxeDZxICescP6488T pHRmJvzwrMqgYpIphFUtkSQVD2HMcHvLZ4PGGQF7Wsp0Gp4D4+++kyrWMWNh4/uaBJ9mFsFD m98BzRibhYJOFSczq2H0y8FEOIDDfYmeIDQvE3z6quZ3aAbWXb5Lango7Iz9SNLwKLjl6KPf 2Tyw/eg2veY1GN6ueqXTOMPh9SOtukowLNRPNtRvJNRvJAQoXJ8Iw42TNcpouLu8w6DhCTB4 oNrQv34IGI4BWOSTRJe3RCm0WKZmIUHyIxfKEjzueoA36cjSdPIC6K3IigCGAlwqfW1Xd54x iS9RSt0RMJwiuKF0zzlcSiv0iKVOXnGu8hW7kBIBkCK5dPrxWdyjRb50A/J5/rRm42+7gzQP FDzqv/evmmqx/P+FM9HhxTl5RsaBt3MNQl7k+6MzkqI4SHecxxaDfciB1hdJLv/fNkElqzFS cYxPKodWvLxbkRxaPwrGUY0Nza3AqJM9MjKbaAJfGCOjkpzFcp9OFzDhgw+hI6pEKt7WPoUu LE5gcbk2IY5vT1/LHAAm69sp8TsP973+OmXTJmq0Y8HCnt3Pq3LWkpuZZbPnxDoeXOosSLd2 rEOLm0YWb2yrOHOaaXxxNb403P5t6+GdbODUFjGt66BrXFrBniLvpeYxH+dXBIPj0/zVT5uE dufc4/VXM+6fOhbTdf5oG9SZv+/KimvZGbcqd2SsbBB6m5eXOzid4uStk0ifwv8C6APZLiIE AAA=
Cc: "'l2vpn@ietf.org'" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 09:12:43 -0000

--_000_F9336571731ADE42A5397FC831CEAA020975DEFRIDWPPMB001ecite_
Content-Type: text/plain; charset="utf-8"
content-transfer-encoding: base64
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--_000_F9336571731ADE42A5397FC831CEAA020975DEFRIDWPPMB001ecite_
Content-Type: text/html; charset="utf-8"
content-transfer-encoding: base64
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=

--_000_F9336571731ADE42A5397FC831CEAA020975DEFRIDWPPMB001ecite_--

From lizho.jin@gmail.com  Tue Jul  3 06:10:34 2012
Return-Path: <lizho.jin@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7B5A21F8855 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:10:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.178
X-Spam-Level: 
X-Spam-Status: No, score=-3.178 tagged_above=-999 required=5 tests=[AWL=-0.180, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m2KY1nOKIXUc for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:10:29 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id F176C21F8649 for <l2vpn@ietf.org>; Tue,  3 Jul 2012 06:10:23 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so5820727ghb.31 for <l2vpn@ietf.org>; Tue, 03 Jul 2012 06:10:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=XkGsVyvRPGoyxI7dWSfmfK7oCaw1WqQmswEE6e4sVqU=; b=B3x0PGRhTGvIDXj8sz9AFGBnXGXk7cRWEAiOEpj5eBoGewfcCljH8rsNxfg76N2PAf AAL6f3r/0s+M2BkB8ImG9TTKXuOG/uW0vaeQ0nwdqvCCetYnTJ5uDNdAHUEp+V6T5eo0 qXw+55i5iRD8+WclWKSeVMqEJEm+nk+fMR/519jBgy2L6WbakBj4Tjk6CmQrVvGYbJwf zCkGiCMCCLMz0RmCPh2p0Uj4a9L5eoRIfS9QfULKLtIImH7oTZHPv6Be1qM2U6Shbwp6 8qyNvg50MqpCFDwYDaymJ3VbhIwo6tjAEoJXgPTUr6HHlXZWQv2NjSU122FzYClUmK0y SetQ==
MIME-Version: 1.0
Received: by 10.50.189.135 with SMTP id gi7mr8030071igc.8.1341321031153; Tue, 03 Jul 2012 06:10:31 -0700 (PDT)
Received: by 10.50.106.198 with HTTP; Tue, 3 Jul 2012 06:10:31 -0700 (PDT)
Date: Tue, 3 Jul 2012 21:10:31 +0800
Message-ID: <CAH==cJxPgNGa5Dwc_r8OFc1-+L7uu1+5fFVrwqvjQwT=GvdbFw@mail.gmail.com>
Subject: Re: EVPN: MAC age
From: Lizhong Jin <lizho.jin@gmail.com>
To: l2vpn@ietf.org,  "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary=14dae934040b977a1804c3eca30a
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 13:10:34 -0000

--14dae934040b977a1804c3eca30a
Content-Type: text/plain; charset=ISO-8859-1

Hi Wim,
I have slightly different opinion about the aging. If the remote MAC
advertised by BGP is aged out by receiving node, how to learn the MAC
address again? Will the unknown unicast packet be broadcasted if aged out?
In my opinion, the control plane should maintain all the MAC address
advertised by BGP without aging, but the dataplane could maintain the
active MAC address only. When not matching for packet forwarding, lookup
the table in control plane, and install the corresponding active MAC entry
in dataplane.

Jakob's question is to ask for  adding an age time to the MAC NLRI. I do
not suggest to do that. If MAC address is aged out, how to handle the
potential unknow unicast packet?

Lizhong



> -------------------------------------
> Message: 1
> Date: Tue, 3 Jul 2012 10:28:38 +0200
> From: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
> To: "'Alexander.Vainshtein@ecitele.com'"
>         <Alexander.Vainshtein@ecitele.com>,     "'jakob.heitz@ericsson.com
> '"
>         <jakob.heitz@ericsson.com>
> Cc: "'l2vpn@ietf.org'" <l2vpn@ietf.org>
> Subject: Re: EVPN: MAC age
> Message-ID:
>         <
> 14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com
> >
>
> Content-Type: text/plain; charset="utf-8"
>
> For remote mac addresses you can rely on bgp withdraws or do aging locally
> based on activity or both. Now given that you provide multi-pathing it is
> best to rely on bgp withdraw for remote mac addresses to ensure consistency
> accross all mes(es).
>
> Cheers,
> Wim
> _________________
> sent from blackberry
>
> From: Alexander Vainshtein [mailto:Alexander.Vainshtein@ecitele.com]
> Sent: Tuesday, July 03, 2012 10:19 AM
> To: Henderickx, Wim (Wim); Jakob Heitz <jakob.heitz@ericsson.com>
> Cc: l2vpn@ietf.org <l2vpn@ietf.org>
> Subject: RE: EVPN: MAC age
>
> Hi all,
> I have doubts regarding the statement in Wim?s message ?Aging is done in
> the same way as VPLS.?
>
> AFAIK VPLS implementations that learn MCA addresses from traffic typically
> maintain ?usage state? for learned MAC addresses i their data path so that
> only MAC addresses that have learned once but not seen for a long time are
> aged out.
>
> To the best of my understanding, in EVPN this would still work for MAC
> addresses learned from the local ACs, but not for MAC addresses that have
> been installed via the control plane. Or do I miss something substantial
> here?
>
> Regards,
>      Sasha
>
>
> Regards,
>      Sasha
>
> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of
> Henderickx, Wim (Wim)
> Sent: Tuesday, July 03, 2012 10:11 AM
> To: Jakob Heitz; l2vpn@ietf.org
> Subject: RE: EVPN: MAC age
>
> Aging is done in the same way as VPLS. You have a local age timer and if
> it expires the MAC address is withdrawn from the EVPN.
>
> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of
> Jakob Heitz
> Sent: dinsdag 3 juli 2012 8:45
> To: l2vpn@ietf.org
> Subject: EVPN: MAC age
>
> Is there a way to age out a MAC address in EVPN?
> Does the advertising MES just withdraw it when it ages out?
> Is there a possibility to add an age to the MAC NLRI?
> Or put an age into a BGP extended community?
>
> --
> Jakob Heitz.
>
>

--14dae934040b977a1804c3eca30a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div>Hi Wim,</div>
<div>I have slightly different opinion about the aging. If the remote=A0MAC=
 advertised by BGP is aged out by receiving node, how to learn the MAC addr=
ess again? Will the unknown unicast packet be broadcasted if aged out?</div=
>

<div>In my opinion, the control plane should maintain all the MAC address a=
dvertised by BGP without aging, but the dataplane could maintain the active=
 MAC address only. When not matching for packet forwarding, lookup the tabl=
e in control plane, and install the corresponding active MAC entry in datap=
lane.</div>

<div>=A0</div>
<div>Jakob&#39;s question is to ask for=A0 adding an age time=A0to the MAC =
NLRI. I do not suggest to do that. If MAC address=A0is aged out, how to han=
dle the potential=A0unknow unicast packet?</div>
<div>=A0</div>
<div>Lizhong</div>
<div><br>=A0</div>
<div class=3D"gmail_quote">
<blockquote style=3D"BORDER-LEFT:#ccc 1px solid;MARGIN:0px 0px 0px 0.8ex;PA=
DDING-LEFT:1ex" class=3D"gmail_quote">-------------------------------------=
<br>Message: 1<br>Date: Tue, 3 Jul 2012 10:28:38 +0200<br>From: &quot;Hende=
rickx, Wim (Wim)&quot; &lt;<a href=3D"mailto:wim.henderickx@alcatel-lucent.=
com">wim.henderickx@alcatel-lucent.com</a>&gt;<br>
To: &quot;&#39;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com">Alexande=
r.Vainshtein@ecitele.com</a>&#39;&quot;<br>=A0 =A0 =A0 =A0 &lt;<a href=3D"m=
ailto:Alexander.Vainshtein@ecitele.com">Alexander.Vainshtein@ecitele.com</a=
>&gt;, =A0 =A0 &quot;&#39;<a href=3D"mailto:jakob.heitz@ericsson.com">jakob=
.heitz@ericsson.com</a>&#39;&quot;<br>
=A0 =A0 =A0 =A0 &lt;<a href=3D"mailto:jakob.heitz@ericsson.com">jakob.heitz=
@ericsson.com</a>&gt;<br>Cc: &quot;&#39;<a href=3D"mailto:l2vpn@ietf.org">l=
2vpn@ietf.org</a>&#39;&quot; &lt;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ie=
tf.org</a>&gt;<br>
Subject: Re: EVPN: MAC age<br>Message-ID:<br>=A0 =A0 =A0 =A0 &lt;<a href=3D=
"mailto:14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alca=
tel-lucent.com">14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.d=
c-m.alcatel-lucent.com</a>&gt;<br>
<br>Content-Type: text/plain; charset=3D&quot;utf-8&quot;<br><br>For remote=
 mac addresses you can rely on bgp withdraws or do aging locally based on a=
ctivity or both. Now given that you provide multi-pathing it is best to rel=
y on bgp withdraw for remote mac addresses to ensure consistency accross al=
l mes(es).<br>
<br>Cheers,<br>Wim<br>_________________<br>sent from blackberry<br><br>From=
: Alexander Vainshtein [mailto:<a href=3D"mailto:Alexander.Vainshtein@ecite=
le.com">Alexander.Vainshtein@ecitele.com</a>]<br>Sent: Tuesday, July 03, 20=
12 10:19 AM<br>
To: Henderickx, Wim (Wim); Jakob Heitz &lt;<a href=3D"mailto:jakob.heitz@er=
icsson.com">jakob.heitz@ericsson.com</a>&gt;<br>Cc: <a href=3D"mailto:l2vpn=
@ietf.org">l2vpn@ietf.org</a> &lt;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@i=
etf.org</a>&gt;<br>
Subject: RE: EVPN: MAC age<br><br>Hi all,<br>I have doubts regarding the st=
atement in Wim?s message ?Aging is done in the same way as VPLS.?<br><br>AF=
AIK VPLS implementations that learn MCA addresses from traffic typically ma=
intain ?usage state? for learned MAC addresses i their data path so that on=
ly MAC addresses that have learned once but not seen for a long time are ag=
ed out.<br>
<br>To the best of my understanding, in EVPN this would still work for MAC =
addresses learned from the local ACs, but not for MAC addresses that have b=
een installed via the control plane. Or do I miss something substantial her=
e?<br>
<br>Regards,<br>=A0 =A0 =A0Sasha<br><br><br>Regards,<br>=A0 =A0 =A0Sasha<br=
><br>From: <a href=3D"mailto:l2vpn-bounces@ietf.org">l2vpn-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:l2vpn-bounces@ietf.org">l2vpn-bounces@ietf.o=
rg</a>] On Behalf Of Henderickx, Wim (Wim)<br>
Sent: Tuesday, July 03, 2012 10:11 AM<br>To: Jakob Heitz; <a href=3D"mailto=
:l2vpn@ietf.org">l2vpn@ietf.org</a><br>Subject: RE: EVPN: MAC age<br><br>Ag=
ing is done in the same way as VPLS. You have a local age timer and if it e=
xpires the MAC address is withdrawn from the EVPN.<br>
<br>From: <a href=3D"mailto:l2vpn-bounces@ietf.org">l2vpn-bounces@ietf.org<=
/a> [mailto:<a href=3D"mailto:l2vpn-bounces@ietf.org">l2vpn-bounces@ietf.or=
g</a>] On Behalf Of Jakob Heitz<br>Sent: dinsdag 3 juli 2012 8:45<br>To: <a=
 href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.org</a><br>
Subject: EVPN: MAC age<br><br>Is there a way to age out a MAC address in EV=
PN?<br>Does the advertising MES just withdraw it when it ages out?<br>Is th=
ere a possibility to add an age to the MAC NLRI?<br>Or put an age into a BG=
P extended community?<br>
<br>--<br>Jakob Heitz.<br><br></blockquote></div>

--14dae934040b977a1804c3eca30a--

From wim.henderickx@alcatel-lucent.com  Tue Jul  3 06:17:17 2012
Return-Path: <wim.henderickx@alcatel-lucent.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24B4C21F8738 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:17:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.615
X-Spam-Level: 
X-Spam-Status: No, score=-7.615 tagged_above=-999 required=5 tests=[AWL=-2.467, BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, J_CHICKENPOX_31=0.6, MIME_BAD_LINEBREAK=0.5, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WEUP22ZJaLgc for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:17:15 -0700 (PDT)
Received: from smail3.alcatel.fr (smail3.alcatel.fr [62.23.212.56]) by ietfa.amsl.com (Postfix) with ESMTP id D2D3521F885E for <l2vpn@ietf.org>; Tue,  3 Jul 2012 06:17:14 -0700 (PDT)
Received: from FRMRSSXCHHUB02.dc-m.alcatel-lucent.com (FRMRSSXCHHUB02.dc-m.alcatel-lucent.com [135.120.45.62]) by smail3.alcatel.fr (8.14.3/8.14.3/ICT) with ESMTP id q63DH5V6024929 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Tue, 3 Jul 2012 15:17:19 +0200
Received: from FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com ([135.120.45.43]) by FRMRSSXCHHUB02.dc-m.alcatel-lucent.com ([135.120.45.62]) with mapi; Tue, 3 Jul 2012 15:17:10 +0200
From: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
To: "'lizho.jin@gmail.com'" <lizho.jin@gmail.com>, "'l2vpn@ietf.org'" <l2vpn@ietf.org>
Date: Tue, 3 Jul 2012 15:17:09 +0200
Subject: Re: EVPN: MAC age
Thread-Topic: EVPN: MAC age
Thread-Index: Ac1ZHU7ojnMOG2woQWaG3agCD9+taAAANeNN
Message-ID: <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
In-Reply-To: <CAH==cJxPgNGa5Dwc_r8OFc1-+L7uu1+5fFVrwqvjQwT=GvdbFw@mail.gmail.com>
Accept-Language: nl-NL, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: nl-NL, en-US
Content-Type: multipart/alternative; boundary="_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9FRMRSSXCHMBSB_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.69 on 155.132.188.83
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 13:17:17 -0000

--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9FRMRSSXCHMBSB_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9FRMRSSXCHMBSB_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9FRMRSSXCHMBSB_--

From lizho.jin@gmail.com  Tue Jul  3 06:40:16 2012
Return-Path: <lizho.jin@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A373D21F869F for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:40:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[AWL=-0.150, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X4Txmely18QF for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 06:40:13 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id E3FD821F87C9 for <l2vpn@ietf.org>; Tue,  3 Jul 2012 06:40:12 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so5859561ghb.31 for <l2vpn@ietf.org>; Tue, 03 Jul 2012 06:40:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=lOnIX7sNioieoc490yxCGZAmPA+/VlerFHnc9rh0YfM=; b=EPaF0s7Rg+j4z4JL3pU0TmMGgl3VmBwdKha0OLloMLBMzYxlhCtdSFhhWmmIUTSJwq 9IQ3xEE36Rj5zYTddc52HsrM3f9p9ffbfMVF8gIcJowFJKORH32PtjXCrd/doGxEQFw5 whOuQkVLJX9IekiBc9CzYaNxemi6xi99NJX0n8ExsqbF3uEhS/c27iRdrOG3EMz3nlxi 3nALd56ixQPNrf/2xH+1IjpxkElqRdl6nRAiUvQ9+qMpKhrC+ePyqgWk9SY1WDWN924v s1sJ4odadyoZWZ5ra09K+TF1tggVosB5a+OCfBeKW/Fos6IznYM1El16hK1POeYegY/L kwlg==
MIME-Version: 1.0
Received: by 10.50.189.135 with SMTP id gi7mr8130401igc.8.1341322816777; Tue, 03 Jul 2012 06:40:16 -0700 (PDT)
Received: by 10.50.106.198 with HTTP; Tue, 3 Jul 2012 06:40:16 -0700 (PDT)
In-Reply-To: <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
References: <CAH==cJxPgNGa5Dwc_r8OFc1-+L7uu1+5fFVrwqvjQwT=GvdbFw@mail.gmail.com> <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com>
Date: Tue, 3 Jul 2012 21:40:16 +0800
Message-ID: <CAH==cJyuY+Pj5zk-1WD1jd8M9xSst2iTpwii+p0O+VLDy++DHw@mail.gmail.com>
Subject: Re: EVPN: MAC age
From: Lizhong Jin <lizho.jin@gmail.com>
To: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary=14dae934040b05ed8d04c3ed0ecf
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 13:40:17 -0000

--14dae934040b05ed8d04c3ed0ecf
Content-Type: text/plain; charset=ISO-8859-1

Agree with the below statement now.

Thanks
Lizhong

On Tue, Jul 3, 2012 at 9:17 PM, Henderickx, Wim (Wim) <
wim.henderickx@alcatel-lucent.com> wrote:

> See my reply to alex. The remote macs should controlled by bgp. The local
> mac can either be preregistered via a protocol or learned in the dataplane.
> For preregistration the protocol should take care of the aging while for
> dataplane learning dataplane aging is required.
>
> Cheers,
> Wim
> _________________
> sent from blackberry
>
>
> *From*: Lizhong Jin [mailto:lizho.jin@gmail.com]
> *Sent*: Tuesday, July 03, 2012 03:10 PM
> *To*: l2vpn@ietf.org <l2vpn@ietf.org>; Henderickx, Wim (Wim)
>  *Subject*: Re: EVPN: MAC age
>
>  Hi Wim,
> I have slightly different opinion about the aging. If the remote MAC
> advertised by BGP is aged out by receiving node, how to learn the MAC
> address again? Will the unknown unicast packet be broadcasted if aged out?
> In my opinion, the control plane should maintain all the MAC address
> advertised by BGP without aging, but the dataplane could maintain the
> active MAC address only. When not matching for packet forwarding, lookup
> the table in control plane, and install the corresponding active MAC entry
> in dataplane.
>
> Jakob's question is to ask for  adding an age time to the MAC NLRI. I do
> not suggest to do that. If MAC address is aged out, how to handle the
> potential unknow unicast packet?
>
> Lizhong
>
>
>
>> -------------------------------------
>> Message: 1
>> Date: Tue, 3 Jul 2012 10:28:38 +0200
>> From: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
>> To: "'Alexander.Vainshtein@ecitele.com'"
>>         <Alexander.Vainshtein@ecitele.com>,     "'
>> jakob.heitz@ericsson.com'"
>>         <jakob.heitz@ericsson.com>
>> Cc: "'l2vpn@ietf.org'" <l2vpn@ietf.org>
>> Subject: Re: EVPN: MAC age
>> Message-ID:
>>         <
>> 14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com
>> >
>>
>> Content-Type: text/plain; charset="utf-8"
>>
>> For remote mac addresses you can rely on bgp withdraws or do aging
>> locally based on activity or both. Now given that you provide multi-pathing
>> it is best to rely on bgp withdraw for remote mac addresses to ensure
>> consistency accross all mes(es).
>>
>> Cheers,
>> Wim
>> _________________
>> sent from blackberry
>>
>> From: Alexander Vainshtein [mailto:Alexander.Vainshtein@ecitele.com]
>> Sent: Tuesday, July 03, 2012 10:19 AM
>> To: Henderickx, Wim (Wim); Jakob Heitz <jakob.heitz@ericsson.com>
>> Cc: l2vpn@ietf.org <l2vpn@ietf.org>
>> Subject: RE: EVPN: MAC age
>>
>> Hi all,
>> I have doubts regarding the statement in Wim?s message ?Aging is done in
>> the same way as VPLS.?
>>
>> AFAIK VPLS implementations that learn MCA addresses from traffic
>> typically maintain ?usage state? for learned MAC addresses i their data
>> path so that only MAC addresses that have learned once but not seen for a
>> long time are aged out.
>>
>> To the best of my understanding, in EVPN this would still work for MAC
>> addresses learned from the local ACs, but not for MAC addresses that have
>> been installed via the control plane. Or do I miss something substantial
>> here?
>>
>> Regards,
>>      Sasha
>>
>>
>> Regards,
>>      Sasha
>>
>> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf
>> Of Henderickx, Wim (Wim)
>> Sent: Tuesday, July 03, 2012 10:11 AM
>> To: Jakob Heitz; l2vpn@ietf.org
>> Subject: RE: EVPN: MAC age
>>
>> Aging is done in the same way as VPLS. You have a local age timer and if
>> it expires the MAC address is withdrawn from the EVPN.
>>
>> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf
>> Of Jakob Heitz
>> Sent: dinsdag 3 juli 2012 8:45
>> To: l2vpn@ietf.org
>> Subject: EVPN: MAC age
>>
>> Is there a way to age out a MAC address in EVPN?
>> Does the advertising MES just withdraw it when it ages out?
>> Is there a possibility to add an age to the MAC NLRI?
>> Or put an age into a BGP extended community?
>>
>> --
>> Jakob Heitz.
>>
>>

--14dae934040b05ed8d04c3ed0ecf
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div>Agree with the below statement now.</div>
<div>=A0</div>
<div>Thanks</div>
<div>Lizhong<br><br></div>
<div class=3D"gmail_quote">On Tue, Jul 3, 2012 at 9:17 PM, Henderickx, Wim =
(Wim) <span dir=3D"ltr">&lt;<a href=3D"mailto:wim.henderickx@alcatel-lucent=
.com" target=3D"_blank">wim.henderickx@alcatel-lucent.com</a>&gt;</span> wr=
ote:<br>

<blockquote style=3D"BORDER-LEFT:#ccc 1px solid;MARGIN:0px 0px 0px 0.8ex;PA=
DDING-LEFT:1ex" class=3D"gmail_quote"><font style=3D"FONT-FAMILY:&#39;Calib=
ri&#39;,&#39;sans-serif&#39;;COLOR:#1f497d;FONT-SIZE:11pt">See my reply to =
alex. The remote macs should controlled by bgp. The local mac can either be=
 preregistered via a protocol or learned in the dataplane. For preregistrat=
ion the protocol should take care of the aging while for dataplane learning=
 dataplane aging is required. <br>

<div class=3D"im"><br>Cheers, <br>Wim <br>_________________ <br>sent from b=
lackberry</div></font><br>=A0<br>
<div style=3D"BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOT=
TOM:0in;PADDING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BOR=
DER-RIGHT:medium none;PADDING-TOP:3pt"><font style=3D"FONT-FAMILY:&#39;Taho=
ma&#39;,&#39;sans-serif&#39;;FONT-SIZE:10pt"><b>From</b>: Lizhong Jin [mail=
to:<a href=3D"mailto:lizho.jin@gmail.com" target=3D"_blank">lizho.jin@gmail=
.com</a>] <br>
<b>Sent</b>: Tuesday, July 03, 2012 03:10 PM<br><b>To</b>: <a href=3D"mailt=
o:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a> &lt;<a href=3D"mailt=
o:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a>&gt;; Henderickx, Wim=
 (Wim) <br>

<div>
<div class=3D"h5"><b>Subject</b>: Re: EVPN: MAC age <br></div></div></font>=
=A0<br></div>
<div class=3D"HOEnZb">
<div class=3D"h5">
<div>Hi Wim,</div>
<div>I have slightly different opinion about the aging. If the remote=A0MAC=
 advertised by BGP is aged out by receiving node, how to learn the MAC addr=
ess again? Will the unknown unicast packet be broadcasted if aged out?</div=
>

<div>In my opinion, the control plane should maintain all the MAC address a=
dvertised by BGP without aging, but the dataplane could maintain the active=
 MAC address only. When not matching for packet forwarding, lookup the tabl=
e in control plane, and install the corresponding active MAC entry in datap=
lane.</div>

<div>=A0</div>
<div>Jakob&#39;s question is to ask for=A0 adding an age time=A0to the MAC =
NLRI. I do not suggest to do that. If MAC address=A0is aged out, how to han=
dle the potential=A0unknow unicast packet?</div>
<div>=A0</div>
<div>Lizhong</div>
<div><br>=A0</div>
<div class=3D"gmail_quote">
<blockquote style=3D"BORDER-LEFT:#ccc 1px solid;MARGIN:0px 0px 0px 0.8ex;PA=
DDING-LEFT:1ex" class=3D"gmail_quote">-------------------------------------=
<br>Message: 1<br>Date: Tue, 3 Jul 2012 10:28:38 +0200<br>From: &quot;Hende=
rickx, Wim (Wim)&quot; &lt;<a href=3D"mailto:wim.henderickx@alcatel-lucent.=
com" target=3D"_blank">wim.henderickx@alcatel-lucent.com</a>&gt;<br>
To: &quot;&#39;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com" target=
=3D"_blank">Alexander.Vainshtein@ecitele.com</a>&#39;&quot;<br>=A0 =A0 =A0 =
=A0 &lt;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com" target=3D"_blan=
k">Alexander.Vainshtein@ecitele.com</a>&gt;, =A0 =A0 &quot;&#39;<a href=3D"=
mailto:jakob.heitz@ericsson.com" target=3D"_blank">jakob.heitz@ericsson.com=
</a>&#39;&quot;<br>
=A0 =A0 =A0 =A0 &lt;<a href=3D"mailto:jakob.heitz@ericsson.com" target=3D"_=
blank">jakob.heitz@ericsson.com</a>&gt;<br>Cc: &quot;&#39;<a href=3D"mailto=
:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a>&#39;&quot; &lt;<a hre=
f=3D"mailto:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a>&gt;<br>
Subject: Re: EVPN: MAC age<br>Message-ID:<br>=A0 =A0 =A0 =A0 &lt;<a href=3D=
"mailto:14C7F4F06DB5814AB0DE29716C4F6D6702DF2171DD@FRMRSSXCHMBSB1.dc-m.alca=
tel-lucent.com" target=3D"_blank">14C7F4F06DB5814AB0DE29716C4F6D6702DF2171D=
D@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com</a>&gt;<br>
<br>Content-Type: text/plain; charset=3D&quot;utf-8&quot;<br><br>For remote=
 mac addresses you can rely on bgp withdraws or do aging locally based on a=
ctivity or both. Now given that you provide multi-pathing it is best to rel=
y on bgp withdraw for remote mac addresses to ensure consistency accross al=
l mes(es).<br>
<br>Cheers,<br>Wim<br>_________________<br>sent from blackberry<br><br>From=
: Alexander Vainshtein [mailto:<a href=3D"mailto:Alexander.Vainshtein@ecite=
le.com" target=3D"_blank">Alexander.Vainshtein@ecitele.com</a>]<br>Sent: Tu=
esday, July 03, 2012 10:19 AM<br>
To: Henderickx, Wim (Wim); Jakob Heitz &lt;<a href=3D"mailto:jakob.heitz@er=
icsson.com" target=3D"_blank">jakob.heitz@ericsson.com</a>&gt;<br>Cc: <a hr=
ef=3D"mailto:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a> &lt;<a hr=
ef=3D"mailto:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a>&gt;<br>
Subject: RE: EVPN: MAC age<br><br>Hi all,<br>I have doubts regarding the st=
atement in Wim?s message ?Aging is done in the same way as VPLS.?<br><br>AF=
AIK VPLS implementations that learn MCA addresses from traffic typically ma=
intain ?usage state? for learned MAC addresses i their data path so that on=
ly MAC addresses that have learned once but not seen for a long time are ag=
ed out.<br>
<br>To the best of my understanding, in EVPN this would still work for MAC =
addresses learned from the local ACs, but not for MAC addresses that have b=
een installed via the control plane. Or do I miss something substantial her=
e?<br>
<br>Regards,<br>=A0 =A0 =A0Sasha<br><br><br>Regards,<br>=A0 =A0 =A0Sasha<br=
><br>From: <a href=3D"mailto:l2vpn-bounces@ietf.org" target=3D"_blank">l2vp=
n-bounces@ietf.org</a> [mailto:<a href=3D"mailto:l2vpn-bounces@ietf.org" ta=
rget=3D"_blank">l2vpn-bounces@ietf.org</a>] On Behalf Of Henderickx, Wim (W=
im)<br>
Sent: Tuesday, July 03, 2012 10:11 AM<br>To: Jakob Heitz; <a href=3D"mailto=
:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a><br>Subject: RE: EVPN:=
 MAC age<br><br>Aging is done in the same way as VPLS. You have a local age=
 timer and if it expires the MAC address is withdrawn from the EVPN.<br>
<br>From: <a href=3D"mailto:l2vpn-bounces@ietf.org" target=3D"_blank">l2vpn=
-bounces@ietf.org</a> [mailto:<a href=3D"mailto:l2vpn-bounces@ietf.org" tar=
get=3D"_blank">l2vpn-bounces@ietf.org</a>] On Behalf Of Jakob Heitz<br>Sent=
: dinsdag 3 juli 2012 8:45<br>
To: <a href=3D"mailto:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.org</a><=
br>Subject: EVPN: MAC age<br><br>Is there a way to age out a MAC address in=
 EVPN?<br>Does the advertising MES just withdraw it when it ages out?<br>Is=
 there a possibility to add an age to the MAC NLRI?<br>
Or put an age into a BGP extended community?<br><br>--<br>Jakob Heitz.<br><=
br></blockquote></div></div></div></blockquote></div><br>

--14dae934040b05ed8d04c3ed0ecf--

From nabil.n.bitar@verizon.com  Tue Jul  3 13:37:38 2012
Return-Path: <nabil.n.bitar@verizon.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6B7821F86C3 for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 13:37:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.412
X-Spam-Level: 
X-Spam-Status: No, score=-3.412 tagged_above=-999 required=5 tests=[AWL=0.186,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V7L-+aYg7Ueb for <l2vpn@ietfa.amsl.com>; Tue,  3 Jul 2012 13:37:38 -0700 (PDT)
Received: from fldsmtpe01.verizon.com (fldsmtpe01.verizon.com [140.108.26.140]) by ietfa.amsl.com (Postfix) with ESMTP id 64D6421F87DC for <l2vpn@ietf.org>; Tue,  3 Jul 2012 13:37:37 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: false
Received: from unknown (HELO fldsmtpi02.verizon.com) ([166.68.71.144]) by fldsmtpe01.verizon.com with ESMTP; 03 Jul 2012 20:37:45 +0000
From: "Bitar, Nabil N" <nabil.n.bitar@verizon.com>
X-IronPort-AV: E=Sophos;i="4.77,517,1336348800";  d="scan'208,217";a="293210962"
Received: from fldp1lumxc7hb02.verizon.com (HELO FLDP1LUMXC7HB02.us.one.verizon.com) ([166.68.75.85]) by fldsmtpi02.verizon.com with ESMTP; 03 Jul 2012 20:37:44 +0000
Received: from fldp1lumxc7v63.us.one.verizon.com ([166.68.45.45]) by FLDP1LUMXC7HB02.us.one.verizon.com ([166.68.75.85]) with mapi; Tue, 3 Jul 2012 16:37:44 -0400
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Tue, 3 Jul 2012 16:37:49 -0400
Subject: [l2vpn] L2VPN Agenda Slot Call for IETF 84 - Vancouver
Thread-Topic: [l2vpn] L2VPN Agenda Slot Call for IETF 84 - Vancouver
Thread-Index: Ac1ZW7LqXlP+j6cwRAu7cIshwYHTug==
Message-ID: <CC18CF15.345D5%nabil.n.bitar@verizon.com>
In-Reply-To: <CB8CA0A6.238F5%nabil.n.bitar@verizon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.10.0.110310
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_CC18CF15345D5nabilnbitarverizoncom_"
MIME-Version: 1.0
Cc: Giles Heron <giheron@cisco.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 20:37:38 -0000

--_000_CC18CF15345D5nabilnbitarverizoncom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi L2VPN WG.
Please let us know if you have a time-slot request for the L2VPN session at=
 IETF 84=96Vancouver. Please,  email us your request by Sunday July 15, 201=
2 along with the following information:
1) Draft title
2) Presenter name
3) Requested duration

Please note that priority will be given to drafts that are clearly within t=
he scope of the current L2VPN charter.

Additional key dates to remember are:
2012-07-09 (Monday): Internet Draft Cut-off for initial document (-00) subm=
ission by 17:00 PT (UTC -7)
2012-07-16 (Monday): Internet Draft final submission cut-off by 17:00 PT (U=
TC -7)

Thanks,
Nabil and Giles

--_000_CC18CF15345D5nabilnbitarverizoncom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
 -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><span class=3D"Apple-style-span=
" style=3D"font-size: 15px; font-family: Calibri, Verdana, Helvetica, Arial=
; ">Hi L2VPN WG.</span></div><span id=3D"OLK_SRC_BODY_SECTION"><div><div st=
yle=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break:=
 after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Cali=
bri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTION"><div><div style=3D"wor=
d-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-whi=
te-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sans-=
serif; "><span id=3D"OLK_SRC_BODY_SECTION"><div><div style=3D"color: rgb(0,=
 0, 0); font-size: 14px; font-family: Calibri, sans-serif; word-wrap: break=
-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><=
span id=3D"OLK_SRC_BODY_SECTION"><div><div><font face=3D"Calibri,Verdana,He=
lvetica,Arial"><span style=3D"font-size:11pt">
Please let us know if you have a time-slot request for the L2VPN session at=
 IETF 84=96Vancouver. Please, &nbsp;email us your request by Sunday July 15=
, 2012 along with the following information:<br>
1) Draft title<br>
2) Presenter name<br>
3) Requested duration<br><br>
Please note that priority will be given to drafts that are clearly within t=
he scope of the current L2VPN charter.<br><br>
Additional key dates to remember are:</span></font></div></div></span></div=
></div></span></div></div></span></div></div></span><div><div> <strong>2012=
-07-09 (Monday):</strong> Internet Draft Cut-off for initial document (-00)=
 submission by

                17:00 PT (UTC -7)</div>

              <div> <strong>2012-07-16 (Monday):</strong> Internet Draft fi=
nal submission cut-off by 17:00 PT (UTC -7)</div></div><span id=3D"OLK_SRC_=
BODY_SECTION"><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-siz=
e: 14px; font-family: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTI=
ON"><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -we=
bkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; f=
ont-family: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTION"><div><=
div style=3D"color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sa=
ns-serif; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-bre=
ak: after-white-space; "><div><font class=3D"Apple-style-span" face=3D"mono=
space"><span class=3D"Apple-style-span" style=3D"white-space: pre; "><font =
class=3D"Apple-style-span" face=3D"Calibri,sans-serif"><span class=3D"Apple=
-style-span" style=3D"white-space: normal;"><br></span></font></span></font=
></div><span id=3D"OLK_SRC_BODY_SECTION"><div><div><font face=3D"Calibri,Ve=
rdana,Helvetica,Arial"><span style=3D"font-size:11pt">
Thanks,<br>Nabil and Giles<br></span></font></div></div></span></div></div>=
</span></div></div></span></div></div></span></body></html>

--_000_CC18CF15345D5nabilnbitarverizoncom_--

From ietf-ipr@ietf.org  Fri Jul  6 10:10:39 2012
Return-Path: <ietf-ipr@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7777721F87BE; Fri,  6 Jul 2012 10:10:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.456
X-Spam-Level: 
X-Spam-Status: No, score=-102.456 tagged_above=-999 required=5 tests=[AWL=0.143, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YgenNXlqFvSo; Fri,  6 Jul 2012 10:10:38 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5430721F8667; Fri,  6 Jul 2012 10:10:34 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-ipr@ietf.org>
To: bhupesh@cisco.com, kireeti@juniper.net, wim.henderickx@alcatel-lucent.be,  florin.balus@alcatel-lucent.com, uttaro@att.com
Subject: IPR Disclosure: Alcatel-Lucent's Statement about IPR related to draft-ietf-l2vpn-vpls-multihoming-03
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p2
Message-ID: <20120706171034.32068.47743.idtracker@ietfa.amsl.com>
Date: Fri, 06 Jul 2012 10:10:34 -0700
X-Mailman-Approved-At: Fri, 06 Jul 2012 10:13:07 -0700
Cc: l2vpn@ietf.org, giheron@cisco.com, ipr-announce@ietf.org, stbryant@cisco.com
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jul 2012 17:10:39 -0000

Dear Bhupesh Kothari, Kireeti Kompella, Wim Henderickx, Florin Balus, James=
 Uttaro:

 An IPR disclosure that pertains to your Internet-Draft entitled "BGP based
Multi-homing in Virtual Private LAN Service" (draft-ietf-l2vpn-vpls-multiho=
ming)
was submitted to the IETF Secretariat on 2012-07-05 and has been posted on =
the
"IETF Page of Intellectual Property Rights Disclosures"
(https://datatracker.ietf.org/ipr/1809/). The title of the IPR disclosure is
"Alcatel-Lucent's Statement about IPR related to draft-ietf-l2vpn-vpls-
multihoming-03."");

The IETF Secretariat


From robert@raszuk.net  Sat Jul  7 05:39:39 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74F3021F860F for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 05:39:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level: 
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uueI4kSQuF9w for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 05:39:38 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 877CE21F8596 for <l2vpn@ietf.org>; Sat,  7 Jul 2012 05:39:38 -0700 (PDT)
Received: (qmail 2593 invoked by uid 399); 7 Jul 2012 12:39:57 -0000
Received: from unknown (HELO ?192.168.1.91?) (pbs:robert@raszuk.net@83.31.236.50) by mail1310.opentransfer.com with ESMTPM; 7 Jul 2012 12:39:57 -0000
X-Originating-IP: 83.31.236.50
Message-ID: <4FF82E1C.6000009@raszuk.net>
Date: Sat, 07 Jul 2012 14:39:56 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <CAH==cJxPgNGa5Dwc_r8OFc1-+L7uu1+5fFVrwqvjQwT=GvdbFw@mail.gmail.com> <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com> <CAH==cJyuY+Pj5zk-1WD1jd8M9xSst2iTpwii+p0O+VLDy++DHw@mail.gmail.com>
In-Reply-To: <CAH==cJyuY+Pj5zk-1WD1jd8M9xSst2iTpwii+p0O+VLDy++DHw@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Jul 2012 12:39:39 -0000

I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.

It proposed an interesting solution to apply algorithmically computed 
VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as 
option C is used.

However I have a fundamental question .. from who the draft is 
protecting the inter-as service ?

Who other then participating ISPs can spoof a value of VPN label ? If 
the solution is protecting from ISPs itself then I think it does not 
help at all as corresponding ISPs/SPs still have full access to their 
PEs and could inject packets to VPN sites at will.

Moreover main issue with option C is not security (at least for the last 
10+ years). Main issue with option C and MPLS is that participating 
providers need to inject into each other's network all of their 
participating PE's /32 addresses so the end to end MPLS LSP can be 
build. Originally that was recommended to be done by mutual 
redistribution to the IGP .. now the general recommendation is to use 
labeled BGP (both IBGP and EBGP).

So fundamental question to the authors ... who is the potential 
attacker/spoofer this draft is aiming to protect from ?

Best regards,
R.




From balajivenkat299@gmail.com  Sat Jul  7 22:25:54 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBBB121F867B for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 22:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7zhIqNx+CkMF for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 22:25:53 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id A8D3021F8679 for <l2vpn@ietf.org>; Sat,  7 Jul 2012 22:25:53 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so17606996pbc.31 for <l2vpn@ietf.org>; Sat, 07 Jul 2012 22:26:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :in-reply-to:mime-version:content-type:content-transfer-encoding; bh=Vqg58J9H1P+KgPDxofMtzlt6i8R/+0Olqj6WTaFio98=; b=lkfA39A+cUhwWCUSg938Y+PBJopXMQA5P77Eq1Ly3kQRyTSVA2v8tx6p/HYTyCyy/Z F6ukyemwMalV/PJAovNY7JvfBx7eCgBaftBejYVS1c4l5NEXTKYIfoSUYWo/6Aicoqjr BPDzVnAUl7GHaP6TyRl7nsVSc9kUwRjgyO53bbGmpo44Q8n6KcaqhyXPa3SB98xn7boQ O70vMheCtL6GRJEmlKgDFKMI17sztdHwD4P8YrsLWdtvANNo6cc35dkwHz8yBYM9n+D9 oqydO8N/cqmEnBLmqLEx/gf2Gi9A7QSVqtF/5WXtRzgDm4Wbx2iRv3mjEYWo+QkIffY0 6r+g==
Received: by 10.68.191.201 with SMTP id ha9mr49778196pbc.75.1341725174360; Sat, 07 Jul 2012 22:26:14 -0700 (PDT)
Received: from [192.168.15.105] ([122.174.19.64]) by mx.google.com with ESMTPS id iu6sm25109048pbc.35.2012.07.07.22.26.11 (version=SSLv3 cipher=OTHER); Sat, 07 Jul 2012 22:26:13 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/14.10.0.110310
Date: Sun, 08 Jul 2012 10:56:07 +0530
Subject: Re: L2vpn Digest, Vol 98, Issue 6
From: balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Message-ID: <CC1F140F.5C97%balajivenkat299@gmail.com>
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
In-Reply-To: <mailman.11.1341687602.7368.l2vpn@ietf.org>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Cc: Shankar Raman M J <mjsraman@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 05:25:55 -0000

Dear Robert,

This scheme is primarily to protect against attacks from within a network
That intervenes the two providers that are participating in inter-provider
Model C.
While it is agreed that if the ISP itself sends packets then the whole
situation
Cannot be recovered from, we intend to use this scheme in places where the
Intervening network between the two providers is compromised. Also if one
or more
Routers of the ISP have been compromised within the ISP's network then an
intruder
Trying to gain access to the VPN traffic would have a hard time guessing
which
Traffic belongs to which VPN with our scheme. We have added more data on
why
We think Model C has a bad protection with respect to its data plane.

By increasing the label space to 40 bits the scheme we propose increases
Guessing the right labels for the right VPNs to non-polynomial time.

Also the following recommendation is usually advised for Model C.

Never connect ASBRs over a shared Layer 2 infrastructure such as an
Internet Exchange Point (IXP). Use a private connection, or at least a
private VLAN.


With our scheme this can be relaxed to a degree is what we feel.

More on Data Plane insecurity in Model C :
==========================================

The security of model C is considerably more open than in models A and B.



On the data plane, the traffic exchanged between the ASBRs contains two
labels:

* VPN label? Is set by the ingress PE to identify the VPN

* PE label? Specifies the LSP to the egress PE


Model C is considerably more open in terms of security than the previous
models, for the following reasons:

* To be able to establish end-to-end LSPs, the service provider must be
able to reach all PEs of the other AS, which hold connections of shared
VPNs. This can be a considerable number of PEs, exposing important parts
of the normally internal infrastructure of an AS to the other AS. This
also means that considerations that are usually local to an AS in terms of
addressing need to be coordinated with the other AS. It also means that
traffic can be sent to a number of internal addresses from the outside,
making possible attacks from the outside. The recommendation is to filter
IP packets into the core as tightly as possible to prevent these issues.
Labeled packets cannot be filtered currently.

* The ASBR does not hold any VPN information. This is a scalability
advantage, but at the same time it prevents the ASBR from checking the VPN
label for its validity. This means that it is impossible to verify the VPN
label in the data path. (In model B, the ASBR holds this information and
can therefore validate the VPN label.) The egress PE cannot verify the
packet anymore because at this point the origin of the packet can no
longer be determined.


Considering these reasons, a potential attack could be AS 1 sending
labeled traffic into AS 2, where the top label represents the label to a
valid egress PE in AS 2. AS 1 holds PE labels for all those PEs in AS 2,
on which it has shared VPNs. However, because the VPN label cannot be
checked by the ASBR, AS 1 could send packets with random VPN labels into
AS 2 without AS 2 having a way to block this. AS 1 has an LSP to the
egress PE in AS 2. This PE has two VPNs configured: VPN A, which is shared
with AS 1, and VPN B, which is not shared with AS 1. By sending the packet
with a VPN label for VPN B, the packet will be forwarded into VPN B. At
the time of writing this draft there was no solution to this issue.

First of all, AS 1 would need to know the VPN label for VPN B. The MPLS
VPN network does not expose the label externally, so there are two ways of
getting it: by espionage, or simply by trying the entire label space. A
label has 20 bits, yielding 220 = 1,048,576 potential label values.
Assuming a single packet attack with a 500-byte packet size, in the worst
case an attacker would need to send 524 MB, which would take approximately
7 minutes on a 10 Mbps link, and 9 hours on a 128 k link. Note that in
practice this number would be statistically smaller, and also, label
numbering is not random, so intelligent guessing could reduce this number
significantly.


Then, a malicious user in AS 1 could only send traffic into the VPN, but
not receive a reply. However, there are a large number of examples in the
history of security where a single unidirectional packet was enough to
propagate a worm, for example. So while this limits the scope of an
attack, it does not rule it out. In any case, the potential attacker would
not receive feedback as to whether the attack was successful.
Therefore, it is not easy to carry out a sophisticated attack against a
VPN from a given AS. But a single-packet unidirectional attack, as
frequently used in the propagation of worms, is possible, even though
statistically unlikely.


Thanks and regards,
Balaji and shankar



On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
wrote:

>If you have received this digest without all the individual message
>attachments you will need to update your digest options in your list
>subscription.  To do so, go to
>
>https://www.ietf.org/mailman/listinfo/l2vpn
>
>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>MIME or Plain Text Digests?" to MIME.  You can set this option
>globally for all the list digests you receive at this point.
>
>
>
>Send L2vpn mailing list submissions to
>	l2vpn@ietf.org
>
>To subscribe or unsubscribe via the World Wide Web, visit
>	https://www.ietf.org/mailman/listinfo/l2vpn
>or, via email, send a message with subject or body 'help' to
>	l2vpn-request@ietf.org
>
>You can reach the person managing the list at
>	l2vpn-owner@ietf.org
>
>When replying, please edit your Subject line so it is more specific
>than "Re: Contents of L2vpn digest..."
>
>
>Today's Topics:
>
>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>      (Robert Raszuk)
>
>
>----------------------------------------------------------------------
>
>Message: 1
>Date: Sat, 07 Jul 2012 14:39:56 +0200
>From: Robert Raszuk <robert@raszuk.net>
>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>Message-ID: <4FF82E1C.6000009@raszuk.net>
>Content-Type: text/plain; charset=ISO-8859-1; format=flowed
>
>
>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>
>It proposed an interesting solution to apply algorithmically computed
>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>option C is used.
>
>However I have a fundamental question .. from who the draft is
>protecting the inter-as service ?
>
>Who other then participating ISPs can spoof a value of VPN label ? If
>the solution is protecting from ISPs itself then I think it does not
>help at all as corresponding ISPs/SPs still have full access to their
>PEs and could inject packets to VPN sites at will.
>
>Moreover main issue with option C is not security (at least for the last
>10+ years). Main issue with option C and MPLS is that participating
>providers need to inject into each other's network all of their
>participating PE's /32 addresses so the end to end MPLS LSP can be
>build. Originally that was recommended to be done by mutual
>redistribution to the IGP .. now the general recommendation is to use
>labeled BGP (both IBGP and EBGP).
>
>So fundamental question to the authors ... who is the potential
>attacker/spoofer this draft is aiming to protect from ?
>
>Best regards,
>R.
>
>
>
>
>
>------------------------------
>
>_______________________________________________
>L2vpn mailing list
>L2vpn@ietf.org
>https://www.ietf.org/mailman/listinfo/l2vpn
>
>
>End of L2vpn Digest, Vol 98, Issue 6
>************************************



From balajivenkat299@gmail.com  Sat Jul  7 23:46:46 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F40121F8780 for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 23:46:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P+hv+wdCDlc5 for <l2vpn@ietfa.amsl.com>; Sat,  7 Jul 2012 23:46:44 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id B510F21F877F for <l2vpn@ietf.org>; Sat,  7 Jul 2012 23:46:44 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so17685797pbc.31 for <l2vpn@ietf.org>; Sat, 07 Jul 2012 23:47:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :in-reply-to:mime-version:content-type:content-transfer-encoding; bh=ONf37ar3S/gnxxDGsNdLcllHI6H7MGo5J8O/dzmAuZE=; b=bpVywwQLTjSAPGxMdHDq7tNsXohmVXEZAqpdgXO0b57FYWs+apg+ET2+7hNb8W/9IC QitIfuvbwzui1J2rLixRMbMhFIIUckxLQLjWI+m5nKnnV2zchP0n6XECfguZxW+QzpHF qD22wdvBzs/TI0xNldxENwojfnsEzQ5TWnUQfX7j74zS9FD0jQMTbKerUTXjuXRfn+A4 N431xK4sHJtXJLaKlXvZ/Sm2fY01miZ0iAkLaeE1TubmFpuLWcZ1GWdksQgONAqLrjwv VpolPeCXg1cREYVAfjZT1U7bJjs/BpLdulnQh0fYqmSp0OvdK0tmaIv2lMxX2L/kw9F7 Djkg==
Received: by 10.68.238.232 with SMTP id vn8mr16365697pbc.78.1341730025847; Sat, 07 Jul 2012 23:47:05 -0700 (PDT)
Received: from [192.168.15.105] ([122.174.11.144]) by mx.google.com with ESMTPS id sy3sm25226432pbc.18.2012.07.07.23.47.02 (version=SSLv3 cipher=OTHER); Sat, 07 Jul 2012 23:47:05 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/14.10.0.110310
Date: Sun, 08 Jul 2012 12:16:58 +0530
Subject: Re: L2vpn Digest, Vol 98, Issue 6
From: balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Message-ID: <CC1F2A48.5CB9%balajivenkat299@gmail.com>
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
In-Reply-To: <mailman.11.1341687602.7368.l2vpn@ietf.org>
Mime-version: 1.0
Content-type: text/plain; charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 06:46:46 -0000

Dear Robert,

As mentioned in the earlier mail the following restriction is imposed on
the
Model C deployment=8A

The consequence of this is that in model C the service providers must
trust each other also in areas that are not shared. Therefore, model C is
most commonly used today where a single operator uses several ASs on the
backbone. In this case, implicit trust exists between the ASs because they
have the same operational control.


In order to stretch this scheme to other Ases under different admin
control this scheme helps out.

Thanks and regards,
Balaji venkat

On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
wrote:

>If you have received this digest without all the individual message
>attachments you will need to update your digest options in your list
>subscription.  To do so, go to
>
>https://www.ietf.org/mailman/listinfo/l2vpn
>
>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>MIME or Plain Text Digests?" to MIME.  You can set this option
>globally for all the list digests you receive at this point.
>
>
>
>Send L2vpn mailing list submissions to
>	l2vpn@ietf.org
>
>To subscribe or unsubscribe via the World Wide Web, visit
>	https://www.ietf.org/mailman/listinfo/l2vpn
>or, via email, send a message with subject or body 'help' to
>	l2vpn-request@ietf.org
>
>You can reach the person managing the list at
>	l2vpn-owner@ietf.org
>
>When replying, please edit your Subject line so it is more specific
>than "Re: Contents of L2vpn digest..."
>
>
>Today's Topics:
>
>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>      (Robert Raszuk)
>
>
>----------------------------------------------------------------------
>
>Message: 1
>Date: Sat, 07 Jul 2012 14:39:56 +0200
>From: Robert Raszuk <robert@raszuk.net>
>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>Message-ID: <4FF82E1C.6000009@raszuk.net>
>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
>
>
>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>
>It proposed an interesting solution to apply algorithmically computed
>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>option C is used.
>
>However I have a fundamental question .. from who the draft is
>protecting the inter-as service ?
>
>Who other then participating ISPs can spoof a value of VPN label ? If
>the solution is protecting from ISPs itself then I think it does not
>help at all as corresponding ISPs/SPs still have full access to their
>PEs and could inject packets to VPN sites at will.
>
>Moreover main issue with option C is not security (at least for the last
>10+ years). Main issue with option C and MPLS is that participating
>providers need to inject into each other's network all of their
>participating PE's /32 addresses so the end to end MPLS LSP can be
>build. Originally that was recommended to be done by mutual
>redistribution to the IGP .. now the general recommendation is to use
>labeled BGP (both IBGP and EBGP).
>
>So fundamental question to the authors ... who is the potential
>attacker/spoofer this draft is aiming to protect from ?
>
>Best regards,
>R.
>
>
>
>
>
>------------------------------
>
>_______________________________________________
>L2vpn mailing list
>L2vpn@ietf.org
>https://www.ietf.org/mailman/listinfo/l2vpn
>
>
>End of L2vpn Digest, Vol 98, Issue 6
>************************************



From jakob.heitz@ericsson.com  Sun Jul  8 00:26:34 2012
Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF2EC21F86D4 for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 00:26:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.493
X-Spam-Level: 
X-Spam-Status: No, score=-6.493 tagged_above=-999 required=5 tests=[AWL=0.106,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KLRQ6mhC75Af for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 00:26:34 -0700 (PDT)
Received: from imr3.ericy.com (imr3.ericy.com [198.24.6.13]) by ietfa.amsl.com (Postfix) with ESMTP id 29E0F21F86D3 for <l2vpn@ietf.org>; Sun,  8 Jul 2012 00:26:33 -0700 (PDT)
Received: from eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) by imr3.ericy.com (8.13.8/8.13.8) with ESMTP id q687QsZZ007892 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 8 Jul 2012 02:26:54 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.2.26]) by eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) with mapi; Sun, 8 Jul 2012 03:26:54 -0400
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Sun, 8 Jul 2012 03:26:55 -0400
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1c2wruiCHNc0LOQk25cBXKChpJ9A==
Message-ID: <2BB4A4BE-59FA-4CC6-A86D-CD96F6C2303E@ericsson.com>
References: <CAH==cJxPgNGa5Dwc_r8OFc1-+L7uu1+5fFVrwqvjQwT=GvdbFw@mail.gmail.com> <14C7F4F06DB5814AB0DE29716C4F6D6702DF2171E9@FRMRSSXCHMBSB1.dc-m.alcatel-lucent.com> <CAH==cJyuY+Pj5zk-1WD1jd8M9xSst2iTpwii+p0O+VLDy++DHw@mail.gmail.com> <4FF82E1C.6000009@raszuk.net>
In-Reply-To: <4FF82E1C.6000009@raszuk.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 07:26:35 -0000

QW5vdGhlciBxdWVzdGlvbi4NCkhvdyBkb2VzIHRoaXMgaW50ZXJhY3Qgd2l0aCBFQ01QIGZsb3cg
aGFzaGluZyBvbiBMU1JzLCByZmM2MzkxIGFuZCBkcmFmdC1pZXRmLW1wbHMtZW50cm9weS1sYWJl
bD8NCg0KLS0NCkpha29iIEhlaXR6Lg0KDQoNCk9uIEp1bCA3LCAyMDEyLCBhdCA1OjQwIEFNLCAi
Um9iZXJ0IFJhc3p1ayIgPHJvYmVydEByYXN6dWsubmV0PG1haWx0bzpyb2JlcnRAcmFzenVrLm5l
dD4+IHdyb3RlOg0KDQoNCkkgaGF2ZSByZWFkIHRoZSBkcmFmdC1tanNyYW1hbi1sMnZwbi12cGxz
LXRpY3RvYy1sYWJlbC1ob3AtMDAudHh0Lg0KDQpJdCBwcm9wb3NlZCBhbiBpbnRlcmVzdGluZyBz
b2x1dGlvbiB0byBhcHBseSBhbGdvcml0aG1pY2FsbHkgY29tcHV0ZWQNClZQTiBsYWJsZSAoZm9y
IEwyVlBOcywgYnV0IGFsc28gcG9zc2libGUgZm9yIEwzVlBOKSB3aGVyZSBpbnRlci1hcw0Kb3B0
aW9uIEMgaXMgdXNlZC4NCg0KSG93ZXZlciBJIGhhdmUgYSBmdW5kYW1lbnRhbCBxdWVzdGlvbiAu
LiBmcm9tIHdobyB0aGUgZHJhZnQgaXMNCnByb3RlY3RpbmcgdGhlIGludGVyLWFzIHNlcnZpY2Ug
Pw0KDQpXaG8gb3RoZXIgdGhlbiBwYXJ0aWNpcGF0aW5nIElTUHMgY2FuIHNwb29mIGEgdmFsdWUg
b2YgVlBOIGxhYmVsID8gSWYNCnRoZSBzb2x1dGlvbiBpcyBwcm90ZWN0aW5nIGZyb20gSVNQcyBp
dHNlbGYgdGhlbiBJIHRoaW5rIGl0IGRvZXMgbm90DQpoZWxwIGF0IGFsbCBhcyBjb3JyZXNwb25k
aW5nIElTUHMvU1BzIHN0aWxsIGhhdmUgZnVsbCBhY2Nlc3MgdG8gdGhlaXINClBFcyBhbmQgY291
bGQgaW5qZWN0IHBhY2tldHMgdG8gVlBOIHNpdGVzIGF0IHdpbGwuDQoNCk1vcmVvdmVyIG1haW4g
aXNzdWUgd2l0aCBvcHRpb24gQyBpcyBub3Qgc2VjdXJpdHkgKGF0IGxlYXN0IGZvciB0aGUgbGFz
dA0KMTArIHllYXJzKS4gTWFpbiBpc3N1ZSB3aXRoIG9wdGlvbiBDIGFuZCBNUExTIGlzIHRoYXQg
cGFydGljaXBhdGluZw0KcHJvdmlkZXJzIG5lZWQgdG8gaW5qZWN0IGludG8gZWFjaCBvdGhlcidz
IG5ldHdvcmsgYWxsIG9mIHRoZWlyDQpwYXJ0aWNpcGF0aW5nIFBFJ3MgLzMyIGFkZHJlc3NlcyBz
byB0aGUgZW5kIHRvIGVuZCBNUExTIExTUCBjYW4gYmUNCmJ1aWxkLiBPcmlnaW5hbGx5IHRoYXQg
d2FzIHJlY29tbWVuZGVkIHRvIGJlIGRvbmUgYnkgbXV0dWFsDQpyZWRpc3RyaWJ1dGlvbiB0byB0
aGUgSUdQIC4uIG5vdyB0aGUgZ2VuZXJhbCByZWNvbW1lbmRhdGlvbiBpcyB0byB1c2UNCmxhYmVs
ZWQgQkdQIChib3RoIElCR1AgYW5kIEVCR1ApLg0KDQpTbyBmdW5kYW1lbnRhbCBxdWVzdGlvbiB0
byB0aGUgYXV0aG9ycyAuLi4gd2hvIGlzIHRoZSBwb3RlbnRpYWwNCmF0dGFja2VyL3Nwb29mZXIg
dGhpcyBkcmFmdCBpcyBhaW1pbmcgdG8gcHJvdGVjdCBmcm9tID8NCg0KQmVzdCByZWdhcmRzLA0K
Ui4NCg0KDQoNCg==

From robert@raszuk.net  Sun Jul  8 04:01:43 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3312E21F86CA for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 04:01:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_13=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Kj7WYZqbA0z for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 04:01:42 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 762A321F869F for <l2vpn@ietf.org>; Sun,  8 Jul 2012 04:01:42 -0700 (PDT)
Received: (qmail 29823 invoked by uid 399); 8 Jul 2012 11:02:02 -0000
Received: from unknown (HELO ?192.168.1.58?) (pbs:robert@raszuk.net@83.9.210.132) by mail1310.opentransfer.com with ESMTPM; 8 Jul 2012 11:02:02 -0000
X-Originating-IP: 83.9.210.132
Message-ID: <4FF968A8.7060806@raszuk.net>
Date: Sun, 08 Jul 2012 13:02:00 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <CC1F140F.5C97%balajivenkat299@gmail.com>
In-Reply-To: <CC1F140F.5C97%balajivenkat299@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 11:01:43 -0000

Hi Balaji,

> Also if one or more Routers of the ISP have been compromised
> within the ISP's network then an intruder Trying to gain
 > access to the VPN traffic would have a hard time guessing
> which Traffic belongs to which VPN with our scheme.

You are effectively saying that if intruder compromises any router in 
the ISP or between ISPs it is quite likely that it may get access to VPN 
label information which are pretty static today. That is actually true 
for L3VPN and L2VPN. It is the same in basic non inter-as service as 
well as with inter-as service option A, B & C.

I do not see why in particular you are just focused on option C ?

Do you have this case in mind:

ISP1 -- ISP2 -- ISP3 where ISP2 is just an MPLS transit sitting with a 
sniffer and observing VPN labels in the data plane ?

I do agree that any LxVPN using BGP does not protect from this type of 
attacks. It is in fact well understood since the early days of MPLS-VPN 
deployments that sites which require security place hardware encryption 
devices between or next to their CEs.

In other words if your ISP network is so unsecure that it would allow to 
inject third party an MPLS encapsulated packets (not your trusted ISP 
option B or option C peer, but one of your customers or hackers) then I 
think all bet's are off as far as your services go.

That is also why for CSC one of the first feature which was added was 
label validation. CE can not inject any other label then the label 
already advertised to it. Some implementations do it also for option B.

While I like your solution in general I think it still needs to find a 
problem. For the problem presented IMHO ISP is much better to protect 
his PEs and his infrastructure rather then trying to make a VPN label a 
bit harder to guess.

Best,
R.






From balajivenkat299@gmail.com  Sun Jul  8 04:39:29 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FFBA21F8703 for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 04:39:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.999
X-Spam-Level: 
X-Spam-Status: No, score=-2.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TBJdrtZMiApp for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 04:39:28 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id C069D21F86B9 for <l2vpn@ietf.org>; Sun,  8 Jul 2012 04:39:28 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so17975516pbc.31 for <l2vpn@ietf.org>; Sun, 08 Jul 2012 04:39:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :in-reply-to:mime-version:content-type:content-transfer-encoding; bh=DGJYIWELua0UNw/FU9ufM6jax/udG2dDD1MQIBwkZIU=; b=gxpzYNQDQtMkSvbzWQuvYrRhsys7PkR0IU/vJdrnmKq94wGfccShj4HjbcSs1FpKVr o8IxLEBjeSFJzyEpSUabBz4/1zc54olCNiNXt48fK3xJzJH4ulBM6daijoU181sEGGay f0IhlIePipC5f3zUy2jK+imk85GvWtkKrUK7sldjFYmV/FdCZHBof9ddbw0Wut0mQPDi dMprRxe+4aY+QASuZgqnvU67fS/+RWw6kzG8q2C5OsbfmJifQ21TkqdQAoTdBxQekbYz 6ATGC4FuibxtvYY4xXxLZVRjvBPdgvW0wcai9epsPsV6GpwNooI7FFMItyqfM1CRBydE LY4g==
Received: by 10.66.76.103 with SMTP id j7mr58090766paw.60.1341747590436; Sun, 08 Jul 2012 04:39:50 -0700 (PDT)
Received: from [192.168.15.105] ([122.164.38.100]) by mx.google.com with ESMTPS id tj4sm25586552pbc.33.2012.07.08.04.39.45 (version=SSLv3 cipher=OTHER); Sun, 08 Jul 2012 04:39:49 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/14.10.0.110310
Date: Sun, 08 Jul 2012 17:09:41 +0530
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: <robert@raszuk.net>
Message-ID: <CC1F6CF4.CA9C%balajivenkat299@gmail.com>
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
In-Reply-To: <4FF968A8.7060806@raszuk.net>
Mime-version: 1.0
Content-type: text/plain; charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 11:39:29 -0000

Dear Robert,

Comments inline=8A.

On 08/07/12 4:32 PM, "Robert Raszuk" <robert@raszuk.net> wrote:

>Hi Balaji,
>
>> Also if one or more Routers of the ISP have been compromised
>> within the ISP's network then an intruder Trying to gain
> > access to the VPN traffic would have a hard time guessing
>> which Traffic belongs to which VPN with our scheme.
>
>You are effectively saying that if intruder compromises any router in
>the ISP or between ISPs it is quite likely that it may get access to VPN
>label information which are pretty static today. That is actually true
>for L3VPN and L2VPN. It is the same in basic non inter-as service as
>well as with inter-as service option A, B & C.

<balaji> We have another draft posted to the L3VPN group with regard
To Option C to protect against spoofing attacks and specifically
man-in-the-middle
Attacks for Option C in L3-VPNs. It is quite basic that all inter-AS
service
Options may suffer from this problem but at least A and B options have a
Capability to validate the inner label. Option C in the case of Inter-AS
doesn't. That's why we focussed on Option C. Some of the references we
Have quoted in the draft are testament to that. In the case of a
non-inter-AS
Case the service provider at least has control over the entire domain and
doesn't have an intervening network like the inter-AS cases.

>
>I do not see why in particular you are just focused on option C ?
>
>Do you have this case in mind:
>
>ISP1 -- ISP2 -- ISP3 where ISP2 is just an MPLS transit sitting with a
>sniffer and observing VPN labels in the data plane ?

This is another case where our scheme can be used to protect the traffic
>From being eavesdropped or attacked from the middle ISP or the intervening
Networks between the ISPs.

>
>I do agree that any LxVPN using BGP does not protect from this type of
>attacks. It is in fact well understood since the early days of MPLS-VPN
>deployments that sites which require security place hardware encryption
>devices between or next to their CEs.
>
>In other words if your ISP network is so unsecure that it would allow to
>inject third party an MPLS encapsulated packets (not your trusted ISP
>option B or option C peer, but one of your customers or hackers) then I
>think all bet's are off as far as your services go.

Our draft never covers the case where the label injected packets are
injected
>From the CE. It covers the case where the trusted or not so trusted ISP
peer
Has been not so diligent as the first provider and allows compromise of
either
A PE router or a P router or the intervening network between the providers.
Attacks can range from spoofing attacks, unidirectional attacks causing
worms
To get in, or even DOS attacks that keep the router busy dropping these
errant
Packets. Our scheme takes care of the same. We do not bring into account or
Consider the case where the label injection is happening from the Ces if
hackers
Are behind such a CE.

To stress again Model C is relatively very easy to break if a
man-in-the-middle
Attack is undertaken as the Pes between the providers do not validate the
label
Hence the need for a solution here.

Thanks and regards,
Balaji venkat
>
>That is also why for CSC one of the first feature which was added was
>label validation. CE can not inject any other label then the label
>already advertised to it. Some implementations do it also for option B.
>
>While I like your solution in general I think it still needs to find a
>problem. For the problem presented IMHO ISP is much better to protect
>his PEs and his infrastructure rather then trying to make a VPN label a
>bit harder to guess.
>
>Best,
>R.
>
>
>
>
>



From balajivenkat299@gmail.com  Sun Jul  8 05:18:53 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DC3221F860B for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 05:18:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r0ycH-nkz+te for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 05:18:52 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id C66AA21F85FD for <l2vpn@ietf.org>; Sun,  8 Jul 2012 05:18:52 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so18015803pbc.31 for <l2vpn@ietf.org>; Sun, 08 Jul 2012 05:19:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=i9N2/pYv1rLWzPySNqtsz9iiUQJtjtFjc2ASwktYNlg=; b=cLO2gy+dysiwWXcQdq7yziQHWRZSgiWfgAs37Em6Kho2mW/H/QjUd0Cs1/V39diUcU BdjCAM5bh57F0dYk8OKEIs6mRYFH397MLNv/FnhJed1KlggyIUY5WEqXRepuGysI6aMf 5LaCN3j4VLvTLKR1EXxED6Hfgf/Taxc1Sj+jyPzW/EsCPTPnK3H4RLGHMBKA5Qt3vVEr 8jmzE2cyKXRHe3pOie83PxDbLTQk/FSTawPNvLqySaNx8PutQCXJGgQi6JPeF+1c2ZHy nJkfrNlei4E3FrWmbmBE1VvkA7jriBTg4n4LWuEEB+EmW8gaFbyWRlAIkYdbdW7IVqfv tmGQ==
MIME-Version: 1.0
Received: by 10.68.217.229 with SMTP id pb5mr51217968pbc.19.1341749953960; Sun, 08 Jul 2012 05:19:13 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Sun, 8 Jul 2012 05:19:13 -0700 (PDT)
Date: Sun, 8 Jul 2012 17:49:13 +0530
Message-ID: <CAHF4apNVOvHZzUa5XVkKZR5m5HQCoW_BrtVbdiQBpgEcXHUP_A@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: jakob.heitz@ericsson.com
Content-Type: multipart/alternative; boundary=047d7b2ed94562198d04c45081fd
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>, robert@raszuk.net
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 12:18:53 -0000

--047d7b2ed94562198d04c45081fd
Content-Type: text/plain; charset=ISO-8859-1

Another question.
How does this interact with ECMP flow hashing on LSRs, rfc6391 and
draft-ietf-mpls-entropy-label?

--
Jakob Heitz.


Dear Jakob,

You are right. With respect to ECMP flow hashing on LSRs (for pseudowires
in RFC 6391) we would have difficulty in providing a clean solution so that
packets are not reordered between multiple ECMP paths. So is also the case
with entropy label draft.

We are in the process of working on this to see if a solution can be given
and if so if it can be given then how elegantly we could give it.

For now the draft proposal for label-hopping would break both of the above.

Your inputs on this would be most useful.

thanks and regards,
balaji venkat

--047d7b2ed94562198d04c45081fd
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
3px;background-color:rgb(255,255,255)">Another question.</span><br style=3D=
"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background=
-color:rgb(255,255,255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
3px;background-color:rgb(255,255,255)">How does this interact with ECMP flo=
w hashing on LSRs, rfc6391 and draft-ietf-mpls-entropy-label?</span><br sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)">
<br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13p=
x;background-color:rgb(255,255,255)"><span style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)"=
>--</span><br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:13px;background-color:rgb(255,255,255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
3px;background-color:rgb(255,255,255)">Jakob Heitz.</span><br style=3D"colo=
r:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-colo=
r:rgb(255,255,255)">
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)"><br></span></div><div><span sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)"><br>
</span></div><div><span style=3D"color:rgb(34,34,34);font-family:arial,sans=
-serif;font-size:13px;background-color:rgb(255,255,255)">Dear Jakob,</span>=
</div><div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;=
font-size:13px;background-color:rgb(255,255,255)"><br>
</span></div><div><span style=3D"color:rgb(34,34,34);font-family:arial,sans=
-serif;font-size:13px;background-color:rgb(255,255,255)">You are right. Wit=
h respect to ECMP flow hashing on LSRs (for pseudowires in RFC 6391) we wou=
ld have difficulty in providing a clean solution so that packets are not re=
ordered between multiple ECMP paths. So is also the case with entropy label=
 draft.</span></div>
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)"><br></span></div><div><span sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)">We are in the process of working on this to s=
ee if a solution can be given and if so if it can be given then how elegant=
ly we could give it.</span></div>
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)"><br></span></div><div><span sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)">For now the draft proposal for label-hopping =
would break both of the above.</span></div>
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)"><br></span></div><div><span sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)">Your inputs on this would be most useful.</sp=
an></div>
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)"><br></span></div><div><span sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;backg=
round-color:rgb(255,255,255)">thanks and regards,</span></div>
<div><span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:13px;background-color:rgb(255,255,255)">balaji venkat</span></div>

--047d7b2ed94562198d04c45081fd--

From robert@raszuk.net  Sun Jul  8 10:56:55 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E040921F85BB for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 10:56:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level: 
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[AWL=0.060,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MCQdWhiQ4oyb for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 10:56:55 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 2AF2721F85AF for <l2vpn@ietf.org>; Sun,  8 Jul 2012 10:56:55 -0700 (PDT)
Received: (qmail 25903 invoked by uid 399); 8 Jul 2012 17:57:17 -0000
Received: from unknown (HELO ?192.168.1.58?) (pbs:robert@raszuk.net@83.9.210.132) by mail1310.opentransfer.com with ESMTPM; 8 Jul 2012 17:57:17 -0000
X-Originating-IP: 83.9.210.132
Message-ID: <4FF9C9FA.2080902@raszuk.net>
Date: Sun, 08 Jul 2012 19:57:14 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com>
In-Reply-To: <CC1F6CF4.CA9C%balajivenkat299@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Jul 2012 17:56:56 -0000

> We do not bring into account or
> Consider the case where the label injection is happening from the Ces if
> hackers are behind such a CE.

If the hacker is not behind the CE where is it ?

Are you saying that peering ISP itself will attack his partner's ISP 
VPNs ? It can still do it at will if the PE which attaches the VPN sites 
are compromised.

Are you saying that your VPN label would not be see by any cli and show 
commands of the end to end participating PEs ? Then this is non starter 
IMHO.

r.

From balajivenkat299@gmail.com  Sun Jul  8 21:45:21 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70A0521F883A for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 21:45:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C9Qqn3sARwGq for <l2vpn@ietfa.amsl.com>; Sun,  8 Jul 2012 21:45:19 -0700 (PDT)
Received: from mail-gg0-f172.google.com (mail-gg0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 3590521F8838 for <l2vpn@ietf.org>; Sun,  8 Jul 2012 21:45:18 -0700 (PDT)
Received: by ggnc4 with SMTP id c4so10640397ggn.31 for <l2vpn@ietf.org>; Sun, 08 Jul 2012 21:45:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=QQpcxUQZ6QT++rZP7K9KHt72n+niC5lQGZFeN5+3tpw=; b=0oIWGITE6AproNOeKgu+CElevJrTYqUCYukp/nRiIl232807QAZv9lN07NUDX9exYP DfhddE4Ujhup14F/ShiQLDWN3ye1uGH7jYzYMGa2wyCyK5LT2bn2XQvaM5/LZS6arT/Y +PTO8oamiUMhoYGE6XYNXUHWuP7nCUxDM3Z72+a/ZpDXAv6jkRQsY/oLYMg0f77KdCWP CkZoEa7JNmrnaD1DYn44SxBJlTPpKIMxT7SxEQhaSAnRtvGFG8lIACjFthrB1t2MPHrJ I2atBTtJeBLiG+0SE/gnIyKpxhMLPX5Cvj4rrRjRBvbp7Ohz2mumF3R6pPtSSFSY3rK1 egVA==
MIME-Version: 1.0
Received: by 10.66.75.202 with SMTP id e10mr63324108paw.55.1341809141409; Sun, 08 Jul 2012 21:45:41 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Sun, 8 Jul 2012 21:45:41 -0700 (PDT)
In-Reply-To: <4FF9C9FA.2080902@raszuk.net>
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net>
Date: Mon, 9 Jul 2012 10:15:41 +0530
Message-ID: <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: robert@raszuk.net
Content-Type: multipart/alternative; boundary=f46d042dfd733ae7d104c45e497f
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 04:45:21 -0000

--f46d042dfd733ae7d104c45e497f
Content-Type: text/plain; charset=ISO-8859-1

Dear Robert,

We talking about the ASBRs between the two or more ISP networks.

Consider the situation that the network / networks between the ASBRs is
compromised or the ASBR itself is compromised then this scheme would apply.

In the case of Model-C the ASBR bordering the ISP networks does not
validate the inner label as it would in the case of Option A and B.

(PE)----(ISP core network 1) ---->(ASBR1) -------(ASBR2)------(ISP core
network 2)----(PE)

The above simple case shows that in the Model C the ASBR would not validate
the inner label and hence it is susceptible to spoofing attacks/
unidirectional attacks etc...

This is the situation that we are guarding against.

Hope this helps.

thanks and regards,
balaji venkat

On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk <robert@raszuk.net> wrote:

>
>  We do not bring into account or
>> Consider the case where the label injection is happening from the Ces if
>> hackers are behind such a CE.
>>
>
> If the hacker is not behind the CE where is it ?
>
> Are you saying that peering ISP itself will attack his partner's ISP VPNs
> ? It can still do it at will if the PE which attaches the VPN sites are
> compromised.
>
> Are you saying that your VPN label would not be see by any cli and show
> commands of the end to end participating PEs ? Then this is non starter
> IMHO.
>
> r.
>

--f46d042dfd733ae7d104c45e497f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear Robert,<div><br></div><div>We talking about the ASBRs between the two =
or more ISP networks.</div><div><br></div><div>Consider the situation that =
the network / networks between the ASBRs is compromised or the ASBR itself =
is compromised then this scheme would apply.</div>
<div><br></div><div>In the case of Model-C the ASBR bordering the ISP netwo=
rks does not validate the inner label as it would in the case of Option A a=
nd B.</div><div><br></div><div>(PE)----(ISP core network 1) ----&gt;(ASBR1)=
 -------(ASBR2)------(ISP core network 2)----(PE)</div>
<div><br></div><div>The above simple case shows that in the Model C the ASB=
R would not validate the inner label and hence it is susceptible to spoofin=
g attacks/ unidirectional attacks etc...</div><div><br></div><div>This is t=
he situation that we are guarding against.</div>
<div><br></div><div>Hope this helps.</div><div><br></div><div>thanks and re=
gards,</div><div>balaji venkat<br><br><div class=3D"gmail_quote">On Sun, Ju=
l 8, 2012 at 11:27 PM, Robert Raszuk <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:robert@raszuk.net" target=3D"_blank">robert@raszuk.net</a>&gt;</span> wro=
te:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">
We do not bring into account or<br>
Consider the case where the label injection is happening from the Ces if<br=
></div>
hackers are behind such a CE.<br>
</blockquote>
<br>
If the hacker is not behind the CE where is it ?<br>
<br>
Are you saying that peering ISP itself will attack his partner&#39;s ISP VP=
Ns ? It can still do it at will if the PE which attaches the VPN sites are =
compromised.<br>
<br>
Are you saying that your VPN label would not be see by any cli and show com=
mands of the end to end participating PEs ? Then this is non starter IMHO.<=
span class=3D"HOEnZb"><font color=3D"#888888"><br>
<br>
r.<br>
</font></span></blockquote></div><br></div>

--f46d042dfd733ae7d104c45e497f--

From talmi@marvell.com  Sun Jul  8 23:14:02 2012
Return-Path: <talmi@marvell.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5013A21F8683; Sun,  8 Jul 2012 23:14:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iiB3k7xMW4IN; Sun,  8 Jul 2012 23:14:01 -0700 (PDT)
Received: from galiil.marvell.com (galiil.marvell.com [199.203.130.254]) by ietfa.amsl.com (Postfix) with ESMTP id 5F29821F8675; Sun,  8 Jul 2012 23:14:01 -0700 (PDT)
From: Tal Mizrahi <talmi@marvell.com>
To: balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 9 Jul 2012 09:14:20 +0300
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1c/mgpbqQ+qAQeQhir8QieA7JhswAm1SNQ
Message-ID: <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com>
In-Reply-To: <CC1F6CF4.CA9C%balajivenkat299@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 06:14:02 -0000

Hi Balaji,

A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:
1.	Since the label hopping mechanism relies on PTP, I understand that PTP t=
raffic itself does not use label hopping, right?
2.	Is there something preventing the attacker from attacking PTP, thus caus=
ing DoS to the data plane?
3.	Is the "additional label" similar to an Integrity Check Value (ICV) comp=
uted over part of the packet header?=20
4.	Is there something in your approach that would prevent an attacker from =
a replay attack?
5.	Looking at "Algorithm 3" I was not sure: does the receiver check two con=
sequent time slots? I could not see such a check. I am referring to a case =
where the sender transmits at the end of a time slot, and the packet is rec=
eived at the beginning of the next time slot. That would mean the receiver =
has to be able to tolerate two concurrent time slots, right?
6.	The security parameters K, TS, A, I are exchanged over a secure link, wh=
ich basically assumes there is a pre-shared key between the peer PEs. A nai=
ve question would be: how is your approach better than just using a standar=
d ICV, based on the existing pre-shared key?

Tal.


From robert@raszuk.net  Mon Jul  9 01:59:26 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B06BB21F8804 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 01:59:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, J_CHICKENPOX_13=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DGkisHKHuNzY for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 01:59:26 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id DF4A921F8803 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 01:59:25 -0700 (PDT)
Received: (qmail 18654 invoked by uid 399); 9 Jul 2012 08:59:48 -0000
Received: from unknown (HELO ?192.168.1.58?) (pbs:robert@raszuk.net@83.9.209.219) by mail1310.opentransfer.com with ESMTPM; 9 Jul 2012 08:59:48 -0000
X-Originating-IP: 83.9.209.219
Message-ID: <4FFA9D82.8090307@raszuk.net>
Date: Mon, 09 Jul 2012 10:59:46 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net> <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com>
In-Reply-To: <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 08:59:26 -0000

Balaji,

Many thx for clearly describing your target.

I am of the opinion that your scheme does not protect from compromised 
ASBR as once hacker has control of the ASBR he can instantiate any vrf 
locally and inject data from the ASBR itself into any VPN using your 
scheme.

For the link between ASBR yes you have a valid point. But note that over 
this link both ISPs exchange their precious infrastructure routes 
(addresses and labels to reach PEs) which if compromised can cause much 
more harm then injecting some packets into a VPN.

Therefor for the case of ASBR to ASBR link being compromized I would 
much more see local link level security (ex: encryption) for both data 
and control planes rather then change of the VPN label allocation scheme 
in both L3VPN networks.

Your scheme just makes the guess harder not that it eliminates the 
attacks. From the point of view of compromised inter-as link an attacker 
can sweep the VPN label range and still find the matching ones for some 
duration of time.

Also I have a different question ...

In each ISP there are 100s of PEs participating in given VPN and perhaps 
very few ASBRs with option C.

Each PE iBGP peers with RR and advertised the VPN label. RR is 
advertising this label to other PEs in a given ISP domain as well as 
over eBGP multihop other RRs in other option C domian.

Are you envisioning in your scheme direct BGP sessions between all 
participating in option C PEs ? Are you envisioning PTP full mesh 
between all PEs in all domains ? How PE if he has today a single IBGP 
session to vpnv4 RR is going to differentiate between VPN labels he want 
to advertise locally within his domain (as today) and those which would 
be used for Inter-AS option C ?


Thx,
R.

> Dear Robert,
>
> We talking about the ASBRs between the two or more ISP networks.
>
> Consider the situation that the network / networks between the ASBRs is
> compromised or the ASBR itself is compromised then this scheme would apply.
>
> In the case of Model-C the ASBR bordering the ISP networks does not
> validate the inner label as it would in the case of Option A and B.
>
> (PE)----(ISP core network 1) ---->(ASBR1) -------(ASBR2)------(ISP core
> network 2)----(PE)
>
> The above simple case shows that in the Model C the ASBR would not
> validate the inner label and hence it is susceptible to spoofing
> attacks/ unidirectional attacks etc...
>
> This is the situation that we are guarding against.
>
> Hope this helps.
>
> thanks and regards,
> balaji venkat
>
> On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk <robert@raszuk.net
> <mailto:robert@raszuk.net>> wrote:
>
>
>         We do not bring into account or
>         Consider the case where the label injection is happening from
>         the Ces if
>         hackers are behind such a CE.
>
>
>     If the hacker is not behind the CE where is it ?
>
>     Are you saying that peering ISP itself will attack his partner's ISP
>     VPNs ? It can still do it at will if the PE which attaches the VPN
>     sites are compromised.
>
>     Are you saying that your VPN label would not be see by any cli and
>     show commands of the end to end participating PEs ? Then this is non
>     starter IMHO.
>
>     r.
>
>



From balajivenkat299@gmail.com  Mon Jul  9 03:21:36 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00FB321F86B4 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 03:21:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.298
X-Spam-Level: 
X-Spam-Status: No, score=-3.298 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HMCtqCEIEtBw for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 03:21:35 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id EB8E421F86AB for <l2vpn@ietf.org>; Mon,  9 Jul 2012 03:21:34 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so19586286pbc.31 for <l2vpn@ietf.org>; Mon, 09 Jul 2012 03:21:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=u8uP3sCMQome74ci3Ip8ZrcopnJtM8JW5z9OFe9Z3Bs=; b=xomfmgj+JFb2WqoNb5X2SbkXNVGf+W33aQ2kXyv3juKKxWjevxiTuJL5FBRxu5wg+L 24NOoZJYgMDZFi6+w0yYPPAqOzoY/D++e9Th3+5LzHcr4irHIv8hkKthwfatXwKYq7EL Xh9mS8ZXxHkReWh+Cn4K5plWlALHnbRTDYmf3of0fx3/2ghgjSiWu1caDEgIMzMUqnXz FMl19fRaBcfcEaSLyXkxAzi0PMh7T9vB7wYYmvapevU2jF/Wc8suFCcBpwKC3KfqhEM7 1R01JVyYkYWfsZz+WsfjRcDpyFPyafAjjqAUel0BlltKLJ1UM5YfiDF1brR8BLP728Uc up8g==
MIME-Version: 1.0
Received: by 10.68.231.10 with SMTP id tc10mr5771391pbc.107.1341829319490; Mon, 09 Jul 2012 03:21:59 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 03:21:59 -0700 (PDT)
In-Reply-To: <4FFA9D82.8090307@raszuk.net>
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net> <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com> <4FFA9D82.8090307@raszuk.net>
Date: Mon, 9 Jul 2012 15:51:59 +0530
Message-ID: <CAHF4apO+2TD7xjEFUsc4cLk1ZhA4AEGrvoPc3YTQo2v1NQfbwA@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: robert@raszuk.net
Content-Type: multipart/alternative; boundary=047d7b33d19eeffeb304c462fbc1
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 10:21:36 -0000

--047d7b33d19eeffeb304c462fbc1
Content-Type: text/plain; charset=ISO-8859-1

Dear Robert,

Comments inline

On Mon, Jul 9, 2012 at 2:29 PM, Robert Raszuk <robert@raszuk.net> wrote:

> Balaji,
>
> Many thx for clearly describing your target.
>
> I am of the opinion that your scheme does not protect from compromised
> ASBR as once hacker has control of the ASBR he can instantiate any vrf
> locally and inject data from the ASBR itself into any VPN using your scheme.
>

I am of the opinion that an ASBR if it does not have peering relationships
with CEs would not have the feature for label-hopping enabled on it and
would have merely peering labels with PE loopback for the other ASBR. In
that case the ASBR cannot use the label hopping feature to inject packets
to the other ASBR into any VPN using the scheme.

>
> For the link between ASBR yes you have a valid point. But note that over
> this link both ISPs exchange their precious infrastructure routes
> (addresses and labels to reach PEs) which if compromised can cause much
> more harm then injecting some packets into a VPN.
>

At least the VPN that employs this scheme will not be affected though it
could harm the provider on the side to which such packets are injected.

>
> Therefor for the case of ASBR to ASBR link being compromized I would much
> more see local link level security (ex: encryption) for both data and
> control planes rather then change of the VPN label allocation scheme in
> both L3VPN networks.
>

Agreed. But if such a thing happens then the scheme would protect the VPN
deploying it to a higher level than it can be done right now with static
labels.

Guessing the right time to use the right label and distinguishing the right
VPN to attack would take a lot more time and effort if the scheme described
in the draft is deployed.

>
> Your scheme just makes the guess harder not that it eliminates the
> attacks. From the point of view of compromised inter-as link an attacker
> can sweep the VPN label range and still find the matching ones for some
> duration of time.
>
>
Sweeping the VPN label range with the Time varying label + the innermost
label which is a hash digest on the labelled packet would be much harder
since two factors have to be gotten right (a) The right label at the right
time for the right VPN and (b) the inner label digest on the payload. So it
would be pretty hard to break this scheme in the required time.

Also I have a different question ...
>
> In each ISP there are 100s of PEs participating in given VPN and perhaps
> very few ASBRs with option C.
>
> Each PE iBGP peers with RR and advertised the VPN label. RR is advertising
> this label to other PEs in a given ISP domain as well as over eBGP multihop
> other RRs in other option C domian.
>
> Are you envisioning in your scheme direct BGP sessions between all
> participating in option C PEs ? Are you envisioning PTP full mesh between
> all PEs in all domains ? How PE if he has today a single IBGP session to
> vpnv4 RR is going to differentiate between VPN labels he want to advertise
> locally within his domain (as today) and those which would be used for
> Inter-AS option C ?
>
>
This scheme could be deployed selectively only for those that require
greater security. All VPN traffic need not be subjected to this scheme. So
you wouldnt need a full PTP mesh between all PEs in all domains. By the
fact that there are more than one labels and a time scheme to use them it
would be possible for the RR and PE to decipher that this is a
label-hopping scheme based on Tic-Toc (of course the Tic-Toc schedule also
would be provided to discriminate this specifically as a Tic-Toc scheme)
for option-C. If this were a distinguishing factor implied it would be
possible to deploy this scheme for option-C alone. Or a suitable community
attribute could specify this.

Hope this helps in explaining to your questions.

Your inputs would be most useful.

thanks and regards,
balaji and team

>
> Thx,
> R.
>
>  Dear Robert,
>>
>> We talking about the ASBRs between the two or more ISP networks.
>>
>> Consider the situation that the network / networks between the ASBRs is
>> compromised or the ASBR itself is compromised then this scheme would
>> apply.
>>
>> In the case of Model-C the ASBR bordering the ISP networks does not
>> validate the inner label as it would in the case of Option A and B.
>>
>> (PE)----(ISP core network 1) ---->(ASBR1) -------(ASBR2)------(ISP core
>> network 2)----(PE)
>>
>> The above simple case shows that in the Model C the ASBR would not
>> validate the inner label and hence it is susceptible to spoofing
>> attacks/ unidirectional attacks etc...
>>
>> This is the situation that we are guarding against.
>>
>> Hope this helps.
>>
>> thanks and regards,
>> balaji venkat
>>
>> On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk <robert@raszuk.net
>> <mailto:robert@raszuk.net>> wrote:
>>
>>
>>         We do not bring into account or
>>         Consider the case where the label injection is happening from
>>         the Ces if
>>         hackers are behind such a CE.
>>
>>
>>     If the hacker is not behind the CE where is it ?
>>
>>     Are you saying that peering ISP itself will attack his partner's ISP
>>     VPNs ? It can still do it at will if the PE which attaches the VPN
>>     sites are compromised.
>>
>>     Are you saying that your VPN label would not be see by any cli and
>>     show commands of the end to end participating PEs ? Then this is non
>>     starter IMHO.
>>
>>     r.
>>
>>
>>
>
>

--047d7b33d19eeffeb304c462fbc1
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear Robert,<div><br></div><div>Comments inline<br><br><div class=3D"gmail_=
quote">On Mon, Jul 9, 2012 at 2:29 PM, Robert Raszuk <span dir=3D"ltr">&lt;=
<a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@raszuk.net</a=
>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Balaji,<br>
<br>
Many thx for clearly describing your target.<br>
<br>
I am of the opinion that your scheme does not protect from compromised ASBR=
 as once hacker has control of the ASBR he can instantiate any vrf locally =
and inject data from the ASBR itself into any VPN using your scheme.<br>
</blockquote><div><br></div><div>I am of the opinion that an ASBR if it doe=
s not have peering relationships with CEs would not have the feature for la=
bel-hopping enabled on it and would have merely peering labels with PE loop=
back for the other ASBR. In that case the ASBR cannot use the label hopping=
 feature to inject packets to the other ASBR into any VPN using the scheme.=
=A0</div>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><br>
For the link between ASBR yes you have a valid point. But note that over th=
is link both ISPs exchange their precious infrastructure routes (addresses =
and labels to reach PEs) which if compromised can cause much more harm then=
 injecting some packets into a VPN.<br>
</blockquote><div>=A0</div><div>At least the VPN that employs this scheme w=
ill not be affected though it could harm the provider on the side to which =
such packets are injected.</div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

<br>
Therefor for the case of ASBR to ASBR link being compromized I would much m=
ore see local link level security (ex: encryption) for both data and contro=
l planes rather then change of the VPN label allocation scheme in both L3VP=
N networks.<br>
</blockquote><div><br></div><div>Agreed. But if such a thing happens then t=
he scheme would protect the VPN deploying it to a higher level than it can =
be done right now with static labels.</div><div><br></div><div>Guessing the=
 right time to use the right label and distinguishing the right VPN to atta=
ck would take a lot more time and effort if the scheme described in the dra=
ft is deployed.</div>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Your scheme just makes the guess harder not that it eliminates the attacks.=
 From the point of view of compromised inter-as link an attacker can sweep =
the VPN label range and still find the matching ones for some duration of t=
ime.<br>

<br></blockquote><div><br></div><div>Sweeping the VPN label range with the =
Time varying label + the innermost label which is a hash digest on the labe=
lled packet would be much harder since two factors have to be gotten right =
(a) The right label at the right time for the right VPN and (b) the inner l=
abel digest on the payload. So it would be pretty hard to break this scheme=
 in the required time.</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
Also I have a different question ...<br>
<br>
In each ISP there are 100s of PEs participating in given VPN and perhaps ve=
ry few ASBRs with option C.<br>
<br>
Each PE iBGP peers with RR and advertised the VPN label. RR is advertising =
this label to other PEs in a given ISP domain as well as over eBGP multihop=
 other RRs in other option C domian.<br>
<br>
Are you envisioning in your scheme direct BGP sessions between all particip=
ating in option C PEs ? Are you envisioning PTP full mesh between all PEs i=
n all domains ? How PE if he has today a single IBGP session to vpnv4 RR is=
 going to differentiate between VPN labels he want to advertise locally wit=
hin his domain (as today) and those which would be used for Inter-AS option=
 C ?<br>

<br></blockquote><div><br></div><div>This scheme could be deployed selectiv=
ely only for those that require greater security. All VPN traffic need not =
be subjected to this scheme. So you wouldnt need a full PTP mesh between al=
l PEs in all domains. By the fact that there are more than one labels and a=
 time scheme to use them it would be possible for the RR and PE to decipher=
 that this is a label-hopping scheme based on Tic-Toc (of course the Tic-To=
c schedule also would be provided to discriminate this specifically as a Ti=
c-Toc scheme) for option-C. If this were a distinguishing factor implied it=
 would be possible to deploy this scheme for option-C alone. Or a suitable =
community attribute could specify this.</div>
<div><br></div><div>Hope this helps in explaining to your questions.</div><=
div><br></div><div>Your inputs would be most useful.</div><div><br></div><d=
iv>thanks and regards,</div><div>balaji and team</div><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">

<br>
Thx,<br>
R.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">
Dear Robert,<br>
<br>
We talking about the ASBRs between the two or more ISP networks.<br>
<br>
Consider the situation that the network / networks between the ASBRs is<br>
compromised or the ASBR itself is compromised then this scheme would apply.=
<br>
<br>
In the case of Model-C the ASBR bordering the ISP networks does not<br>
validate the inner label as it would in the case of Option A and B.<br>
<br>
(PE)----(ISP core network 1) ----&gt;(ASBR1) -------(ASBR2)------(ISP core<=
br>
network 2)----(PE)<br>
<br>
The above simple case shows that in the Model C the ASBR would not<br>
validate the inner label and hence it is susceptible to spoofing<br>
attacks/ unidirectional attacks etc...<br>
<br>
This is the situation that we are guarding against.<br>
<br>
Hope this helps.<br>
<br>
thanks and regards,<br>
balaji venkat<br>
<br>
On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk &lt;<a href=3D"mailto:robert=
@raszuk.net" target=3D"_blank">robert@raszuk.net</a><br></div><div class=3D=
"im">
&lt;mailto:<a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@ra=
szuk.net</a>&gt;&gt; wrote:<br>
<br>
<br>
=A0 =A0 =A0 =A0 We do not bring into account or<br>
=A0 =A0 =A0 =A0 Consider the case where the label injection is happening fr=
om<br>
=A0 =A0 =A0 =A0 the Ces if<br>
=A0 =A0 =A0 =A0 hackers are behind such a CE.<br>
<br>
<br>
=A0 =A0 If the hacker is not behind the CE where is it ?<br>
<br>
=A0 =A0 Are you saying that peering ISP itself will attack his partner&#39;=
s ISP<br>
=A0 =A0 VPNs ? It can still do it at will if the PE which attaches the VPN<=
br>
=A0 =A0 sites are compromised.<br>
<br>
=A0 =A0 Are you saying that your VPN label would not be see by any cli and<=
br>
=A0 =A0 show commands of the end to end participating PEs ? Then this is no=
n<br>
=A0 =A0 starter IMHO.<br>
<br>
=A0 =A0 r.<br>
<br>
<br>
</div></blockquote>
<br>
<br>
</blockquote></div><br></div>

--047d7b33d19eeffeb304c462fbc1--

From ju1738@att.com  Mon Jul  9 04:34:38 2012
Return-Path: <ju1738@att.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55C8821F861F for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 04:34:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.298
X-Spam-Level: 
X-Spam-Status: No, score=-106.298 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vxRlGQzhwE-i for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 04:34:37 -0700 (PDT)
Received: from nbfkord-smmo05.seg.att.com (nbfkord-smmo05.seg.att.com [209.65.160.92]) by ietfa.amsl.com (Postfix) with ESMTP id 5047F21F85F8 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 04:34:37 -0700 (PDT)
Received: from unknown [144.160.128.153] (EHLO nbfkord-smmo05.seg.att.com) by nbfkord-smmo05.seg.att.com(mxl_mta-6.11.0-10) with ESMTP id 6e1caff4.73bbe940.161014.00-578.415923.nbfkord-smmo05.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 11:35:02 +0000 (UTC)
X-MXL-Hash: 4ffac1e6738fc857-6109a15d76df534657d9a2d413a53bb15e787ae9
Received: from unknown [144.160.128.153] (EHLO flpi408.enaf.ffdc.sbc.com) by nbfkord-smmo05.seg.att.com(mxl_mta-6.11.0-10) over TLS secured channel with ESMTP id ed1caff4.0.161004.00-433.415894.nbfkord-smmo05.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 11:34:56 +0000 (UTC)
X-MXL-Hash: 4ffac1e007c047c7-9965ae465849507dd5411b788aed0b439f2efd76
Received: from enaf.ffdc.sbc.com (localhost.localdomain [127.0.0.1]) by flpi408.enaf.ffdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69BYrKN000309; Mon, 9 Jul 2012 04:34:53 -0700
Received: from fflint04.pst.cso.att.com (fflint04.pst.cso.att.com [150.234.39.64]) by flpi408.enaf.ffdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69BYdXq032667 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 9 Jul 2012 04:34:41 -0700
Received: from MISOUT7MSGHUB9C.ITServices.sbc.com (misout7msghub9c.itservices.sbc.com [144.151.223.82]) by fflint04.pst.cso.att.com (RSA Interceptor); Mon, 9 Jul 2012 04:34:16 -0700
Received: from MISOUT7MSGUSR9I.ITServices.sbc.com ([144.151.223.56]) by MISOUT7MSGHUB9C.ITServices.sbc.com ([144.151.223.82]) with mapi id 14.02.0298.004; Mon, 9 Jul 2012 07:34:16 -0400
From: "UTTARO, JAMES" <ju1738@att.com>
To: "'Balaji venkat Venkataswami'" <balajivenkat299@gmail.com>, "robert@raszuk.net" <robert@raszuk.net>
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: AQHNXPkjkVWxthGAfEmFpss0jxEgQpcfhdWAgABpfACAALUtgIAALjeQ
Date: Mon, 9 Jul 2012 11:34:15 +0000
Message-ID: <B17A6910EEDD1F45980687268941550FB32910@MISOUT7MSGUSR9I.ITServices.sbc.com>
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net> <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com>
In-Reply-To: <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.155.252]
Content-Type: multipart/alternative; boundary="_000_B17A6910EEDD1F45980687268941550FB32910MISOUT7MSGUSR9IIT_"
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2010122901)]
X-MAIL-FROM: <ju1738@att.com>
X-SOURCE-IP: [144.160.128.153]
X-AnalysisOut: [v=1.0 c=1 a=gE9O8Arr410A:10 a=wOlsRfkDYaIA:10 a=ofMgfj31e3]
X-AnalysisOut: [cA:10 a=BLceEmwcHowA:10 a=xwOvzTHDVLE4u4nGvK72ag==:17 a=48]
X-AnalysisOut: [vgC7mUAAAA:8 a=2clOPd4PAAAA:8 a=ziNsr6a5nes0vla0Ia4A:9 a=C]
X-AnalysisOut: [juIK1q_8ugA:10 a=lZB815dzVvQA:10 a=bDUki_mJ7DgA:10 a=qnsro]
X-AnalysisOut: [asS5wlNr3Jf:21 a=xlc2B-dHbq3dhwBp:21 a=yMhMjlubAAAA:8 a=SS]
X-AnalysisOut: [mOFEACAAAA:8 a=HllZdqc8cCXLaolXx5cA:9 a=gKO2Hq4RSVkA:10 a=]
X-AnalysisOut: [UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=tXsnliwV7b4A:10 a=hQ7L]
X-AnalysisOut: [Qt6uGEngFO5E:21 a=p9uMiLIgIy3he8qG:21]
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 11:34:38 -0000

--_000_B17A6910EEDD1F45980687268941550FB32910MISOUT7MSGUSR9IIT_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Balaji,

                I understand that the VPN Label that has been assigned is o=
paque at the ASBRs in Option C or C-.. I still do not understand who is act=
ually doing the attacking.. Can you describe the use case? How would the AS=
BR link be attacked and by whom..

Thanks,
                Jim Uttaro

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of B=
alaji venkat Venkataswami
Sent: Monday, July 09, 2012 12:46 AM
To: robert@raszuk.net
Cc: l2vpn@ietf.org; Shankar Raman M J; Bhargav Bhikkaji
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Robert,

We talking about the ASBRs between the two or more ISP networks.

Consider the situation that the network / networks between the ASBRs is com=
promised or the ASBR itself is compromised then this scheme would apply.

In the case of Model-C the ASBR bordering the ISP networks does not validat=
e the inner label as it would in the case of Option A and B.

(PE)----(ISP core network 1) ---->(ASBR1) -------(ASBR2)------(ISP core net=
work 2)----(PE)

The above simple case shows that in the Model C the ASBR would not validate=
 the inner label and hence it is susceptible to spoofing attacks/ unidirect=
ional attacks etc...

This is the situation that we are guarding against.

Hope this helps.

thanks and regards,
balaji venkat
On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk <robert@raszuk.net<mailto:ro=
bert@raszuk.net>> wrote:

We do not bring into account or
Consider the case where the label injection is happening from the Ces if
hackers are behind such a CE.

If the hacker is not behind the CE where is it ?

Are you saying that peering ISP itself will attack his partner's ISP VPNs ?=
 It can still do it at will if the PE which attaches the VPN sites are comp=
romised.

Are you saying that your VPN label would not be see by any cli and show com=
mands of the end to end participating PEs ? Then this is non starter IMHO.

r.


--_000_B17A6910EEDD1F45980687268941550FB32910MISOUT7MSGUSR9IIT_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Balaji,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I underst=
and that the VPN Label that has been assigned is opaque at the ASBRs in Opt=
ion C or C-.. I still do not understand who is actually
 doing the attacking.. Can you describe the use case? How would the ASBR li=
nk be attacked and by whom..<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thanks,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Jim Uttar=
o<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> l2vpn-bo=
unces@ietf.org [mailto:l2vpn-bounces@ietf.org]
<b>On Behalf Of </b>Balaji venkat Venkataswami<br>
<b>Sent:</b> Monday, July 09, 2012 12:46 AM<br>
<b>To:</b> robert@raszuk.net<br>
<b>Cc:</b> l2vpn@ietf.org; Shankar Raman M J; Bhargav Bhikkaji<br>
<b>Subject:</b> Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<o=
:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Dear Robert,<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">We talking about the ASBRs between the two or more I=
SP networks.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Consider the situation that the network / networks b=
etween the ASBRs is compromised or the ASBR itself is compromised then this=
 scheme would apply.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">In the case of Model-C the ASBR bordering the ISP ne=
tworks does not validate the inner label as it would in the case of Option =
A and B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">(PE)----(ISP core network 1) ----&gt;(ASBR1) -------=
(ASBR2)------(ISP core network 2)----(PE)<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The above simple case shows that in the Model C the =
ASBR would not validate the inner label and hence it is susceptible to spoo=
fing attacks/ unidirectional attacks etc...<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">This is the situation that we are guarding against.<=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Hope this helps.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">thanks and regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">balaji venkat<o:p></o=
:p></p>
<div>
<p class=3D"MsoNormal">On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk &lt;<=
a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@raszuk.net</a>=
&gt; wrote:<o:p></o:p></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">We do not bring into account or<br>
Consider the case where the label injection is happening from the Ces if<o:=
p></o:p></p>
</div>
<p class=3D"MsoNormal">hackers are behind such a CE.<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><br>
If the hacker is not behind the CE where is it ?<br>
<br>
Are you saying that peering ISP itself will attack his partner's ISP VPNs ?=
 It can still do it at will if the PE which attaches the VPN sites are comp=
romised.<br>
<br>
Are you saying that your VPN label would not be see by any cli and show com=
mands of the end to end participating PEs ? Then this is non starter IMHO.<=
span style=3D"color:#888888"><br>
<br>
<span class=3D"hoenzb">r.</span></span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_B17A6910EEDD1F45980687268941550FB32910MISOUT7MSGUSR9IIT_--

From balajivenkat299@gmail.com  Mon Jul  9 04:59:30 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B796A21F85D1 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 04:59:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.498
X-Spam-Level: 
X-Spam-Status: No, score=-3.498 tagged_above=-999 required=5 tests=[AWL=0.100,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nczWrB0SxFdt for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 04:59:29 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id C664921F85C5 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 04:59:29 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so19717311pbc.31 for <l2vpn@ietf.org>; Mon, 09 Jul 2012 04:59:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=DAX+jky5V+a+t+dreTwx39w7zYUvTo9wj3tCLR1h45w=; b=vYZzOiMZGNQh9A+PMkzqHTIUma5ZD3eY6mErUWVC/LVdUSQx7PbubIe2NcbBjWtWtP Mr/iy1QhHjgyCWNnVtBrHG4/S+Myz+2LuSPv2+WKO7RYuCPxNvzakQQQj/ug3y+BAuLd 0Tah2TrjwSceXpboAPKffe7WIxz+tU4NDhe/G6xu+qGfyt/PYwQthmsYvVt1gd43+rS7 Bofl7qQog63kHBwuGg229rOA4hyCX9UHAic0eeeW9Yuc5gNzqvY8NNEhLn7CNTkrMIZH mrLoiopbjFL6VKxy0j8W/zH+4/1M7cRXbCiV7BTKENsJIJFJlucyTB1ElTj3s1cUO9XX zutA==
MIME-Version: 1.0
Received: by 10.68.211.193 with SMTP id ne1mr19388060pbc.142.1341835194390; Mon, 09 Jul 2012 04:59:54 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 04:59:54 -0700 (PDT)
In-Reply-To: <B17A6910EEDD1F45980687268941550FB32910@MISOUT7MSGUSR9I.ITServices.sbc.com>
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net> <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com> <B17A6910EEDD1F45980687268941550FB32910@MISOUT7MSGUSR9I.ITServices.sbc.com>
Date: Mon, 9 Jul 2012 17:29:54 +0530
Message-ID: <CAHF4apOMT_rCVwdRnCuGrano-Zw3koNYw-z_-q11-nOZ8TAMiQ@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: "UTTARO, JAMES" <ju1738@att.com>
Content-Type: multipart/alternative; boundary=e89a8fb208e81bda7504c4645a3e
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 11:59:30 -0000

--e89a8fb208e81bda7504c4645a3e
Content-Type: text/plain; charset=ISO-8859-1

Dear James,

Consider the following situation.

Consider two or more providers connecting to each other at an IXP through a
high-end L2 switch that provides connectivity between providers. If the
switch is tapped through either mirroring or through other means, the inner
label can be easily deciphered by the tapper.

Consider another situation where the ASBR of one provider is compromised
and an interested eavesdropper is trying to look into the packets of a
specific VPN (say the defence department or ministry of interior) traffic
which is seeking services from the given  ISPs in the inter-AS setup.

In both these conditions the ASBR to ASBR link may be compromised if there
was not a dedicated link connecting the two providers. If more than two
providers are involved then the situation becomes more susceptible to
spoofing, eavesdropping or unidirectional attacks (DoS, worm etc...).

In such a case our scheme would help since it would confuse the tapper into
thinking that static labels are involved and hence only a subset of packets
of a flow which is using this scheme would be susceptible to such attacks.
By changing the label (inner VPN label) over time it is possible to confuse
the attacker and hence not give him the capability to eavesdrop, attack,
spoof the specific VPN he thinks he is attacking. It would take more time
and complexity for an algorithm to decipher this scheme, specifically the
labels, the time instances where such labels are valid and the inner digest
label that is payload dependent.

Hope this helps.

Your inputs would be most useful.

thanks and regards,
balaji venkat and team

On Mon, Jul 9, 2012 at 5:04 PM, UTTARO, JAMES <ju1738@att.com> wrote:

>  Balaji,****
>
> ** **
>
>                 I understand that the VPN Label that has been assigned is
> opaque at the ASBRs in Option C or C-.. I still do not understand who is
> actually doing the attacking.. Can you describe the use case? How would the
> ASBR link be attacked and by whom..****
>
> ** **
>
> Thanks,****
>
>                 Jim Uttaro****
>
> ** **
>
> *From:* l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] *On Behalf
> Of *Balaji venkat Venkataswami
> *Sent:* Monday, July 09, 2012 12:46 AM
> *To:* robert@raszuk.net
> *Cc:* l2vpn@ietf.org; Shankar Raman M J; Bhargav Bhikkaji
> *Subject:* Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...****
>
> ** **
>
> Dear Robert,****
>
> ** **
>
> We talking about the ASBRs between the two or more ISP networks.****
>
> ** **
>
> Consider the situation that the network / networks between the ASBRs is
> compromised or the ASBR itself is compromised then this scheme would apply.
> ****
>
> ** **
>
> In the case of Model-C the ASBR bordering the ISP networks does not
> validate the inner label as it would in the case of Option A and B.****
>
> ** **
>
> (PE)----(ISP core network 1) ---->(ASBR1) -------(ASBR2)------(ISP core
> network 2)----(PE)****
>
> ** **
>
> The above simple case shows that in the Model C the ASBR would not
> validate the inner label and hence it is susceptible to spoofing attacks/
> unidirectional attacks etc...****
>
> ** **
>
> This is the situation that we are guarding against.****
>
> ** **
>
> Hope this helps.****
>
> ** **
>
> thanks and regards,****
>
> balaji venkat****
>
> On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk <robert@raszuk.net> wrote:*
> ***
>
> ** **
>
> We do not bring into account or
> Consider the case where the label injection is happening from the Ces if**
> **
>
> hackers are behind such a CE.****
>
>
> If the hacker is not behind the CE where is it ?
>
> Are you saying that peering ISP itself will attack his partner's ISP VPNs
> ? It can still do it at will if the PE which attaches the VPN sites are
> compromised.
>
> Are you saying that your VPN label would not be see by any cli and show
> commands of the end to end participating PEs ? Then this is non starter
> IMHO.
>
> r.****
>
> ** **
>

--e89a8fb208e81bda7504c4645a3e
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear James,<div><br></div><div>Consider the following situation.</div><div>=
<br></div><div>Consider two or more providers connecting to each other at a=
n IXP through a high-end L2 switch that provides connectivity between provi=
ders. If the switch is tapped through either mirroring or through other mea=
ns, the inner label can be easily deciphered by the tapper.</div>
<div><br></div><div>Consider another situation where the ASBR of one provid=
er is compromised and an interested eavesdropper is trying to look into the=
 packets of a specific VPN (say the defence department or ministry of inter=
ior) traffic which is seeking services from the given =A0ISPs in the inter-=
AS setup.</div>
<div><br></div><div>In both these conditions the ASBR to ASBR link may be c=
ompromised if there was not a dedicated link connecting the two providers. =
If more than two providers are involved then the situation becomes more sus=
ceptible to spoofing, eavesdropping or unidirectional attacks (DoS, worm et=
c...).=A0</div>
<div><br></div><div>In such a case our scheme would help since it would con=
fuse the tapper into thinking that static labels are involved and hence onl=
y a subset of packets of a flow which is using this scheme would be suscept=
ible to such attacks. By changing the label (inner VPN label) over time it =
is possible to confuse the attacker and hence not give him the capability t=
o eavesdrop, attack, spoof the specific VPN he thinks he is attacking. It w=
ould take more time and complexity for an algorithm to decipher this scheme=
, specifically the labels, the time instances where such labels are valid a=
nd the inner digest label that is payload dependent.</div>
<div><br></div><div>Hope this helps.</div><div><br></div><div>Your inputs w=
ould be most useful.</div><div><br></div><div>thanks and regards,</div><div=
>balaji venkat and team<br><br><div class=3D"gmail_quote">On Mon, Jul 9, 20=
12 at 5:04 PM, UTTARO, JAMES <span dir=3D"ltr">&lt;<a href=3D"mailto:ju1738=
@att.com" target=3D"_blank">ju1738@att.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Balaji,<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 I understand that the VPN Label that has been assigne=
d is opaque at the ASBRs in Option C or C-.. I still do not understand who =
is actually
 doing the attacking.. Can you describe the use case? How would the ASBR li=
nk be attacked and by whom..<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Thanks,<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 Jim Uttaro<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> <a href=
=3D"mailto:l2vpn-bounces@ietf.org" target=3D"_blank">l2vpn-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:l2vpn-bounces@ietf.org" target=3D"_blank">l2=
vpn-bounces@ietf.org</a>]
<b>On Behalf Of </b>Balaji venkat Venkataswami<br>
<b>Sent:</b> Monday, July 09, 2012 12:46 AM<br>
<b>To:</b> <a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@ra=
szuk.net</a><br>
<b>Cc:</b> <a href=3D"mailto:l2vpn@ietf.org" target=3D"_blank">l2vpn@ietf.o=
rg</a>; Shankar Raman M J; Bhargav Bhikkaji<br>
<b>Subject:</b> Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<u=
></u><u></u></span></p>
</div><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<p class=3D"MsoNormal">Dear Robert,<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">We talking about the ASBRs between the two or more I=
SP networks.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Consider the situation that the network / networks b=
etween the ASBRs is compromised or the ASBR itself is compromised then this=
 scheme would apply.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">In the case of Model-C the ASBR bordering the ISP ne=
tworks does not validate the inner label as it would in the case of Option =
A and B.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">(PE)----(ISP core network 1) ----&gt;(ASBR1) -------=
(ASBR2)------(ISP core network 2)----(PE)<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The above simple case shows that in the Model C the =
ASBR would not validate the inner label and hence it is susceptible to spoo=
fing attacks/ unidirectional attacks etc...<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">This is the situation that we are guarding against.<=
u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hope this helps.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">thanks and regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">balaji venkat<u></u><=
u></u></p>
<div>
<p class=3D"MsoNormal">On Sun, Jul 8, 2012 at 11:27 PM, Robert Raszuk &lt;<=
a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@raszuk.net</a>=
&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">We do not bring into account or<br>
Consider the case where the label injection is happening from the Ces if<u>=
</u><u></u></p>
</div>
<p class=3D"MsoNormal">hackers are behind such a CE.<u></u><u></u></p>
</blockquote>
<p class=3D"MsoNormal"><br>
If the hacker is not behind the CE where is it ?<br>
<br>
Are you saying that peering ISP itself will attack his partner&#39;s ISP VP=
Ns ? It can still do it at will if the PE which attaches the VPN sites are =
compromised.<br>
<br>
Are you saying that your VPN label would not be see by any cli and show com=
mands of the end to end participating PEs ? Then this is non starter IMHO.<=
span style=3D"color:#888888"><br>
<br>
<span>r.</span></span><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div></div></div>
</div>

</blockquote></div><br></div>

--e89a8fb208e81bda7504c4645a3e--

From robert@raszuk.net  Mon Jul  9 06:18:35 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7260B11E8087 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 06:18:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.567
X-Spam-Level: 
X-Spam-Status: No, score=-2.567 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YdhQ2E3B3Cik for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 06:18:35 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 9D88711E807F for <l2vpn@ietf.org>; Mon,  9 Jul 2012 06:18:34 -0700 (PDT)
Received: (qmail 26224 invoked by uid 399); 9 Jul 2012 13:18:59 -0000
Received: from unknown (HELO ?192.168.1.91?) (pbs:robert@raszuk.net@83.31.219.81) by mail1310.opentransfer.com with ESMTPM; 9 Jul 2012 13:18:59 -0000
X-Originating-IP: 83.31.219.81
Message-ID: <4FFADA41.1070906@raszuk.net>
Date: Mon, 09 Jul 2012 15:18:57 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <4FF9C9FA.2080902@raszuk.net> <CAHF4apPkRhXSE4DsURnbvFp2r5DL=6S_yGFRxWWQ-Z2N8sYHiQ@mail.gmail.com> <4FFA9D82.8090307@raszuk.net> <CAHF4apO+2TD7xjEFUsc4cLk1ZhA4AEGrvoPc3YTQo2v1NQfbwA@mail.gmail.com>
In-Reply-To: <CAHF4apO+2TD7xjEFUsc4cLk1ZhA4AEGrvoPc3YTQo2v1NQfbwA@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: l2vpn@ietf.org, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 13:18:35 -0000

Hi Balaji,

> I am of the opinion that an ASBR if it does not have peering
> relationships with CEs would not have the feature for label-hopping
> enabled on it

And based number of projects I have seen ASBR pretty much always is also 
acting as PE and have customers attached. ASBRs are just too expensive 
to place them in the network with just two interfaces hanging there.

> Agreed. But if such a thing happens then the scheme would protect the
> VPN deploying it to a higher level than it can be done right now with
> static labels.

Do you see any value of your proposal if one could do IPSec between PEs 
in hardware with any rate which is required by inter-AS option C 
customers ?

Yes you compare this in the draft using one x86 generic compute 
platform. But if we assume that PEs used are capable of IPSec would you 
still deploy your scheme ?

Note that there is another significant advantage of using IPSec between 
option C PEs .. it runs over IP. So no need to build hierarchy of MPLS 
labels for transport nor exchange all of those /32s loopbacks between 
any domains for constructing transport level LSP.

Thx,
R.


From josh.rogers@twcable.com  Mon Jul  9 07:21:57 2012
Return-Path: <josh.rogers@twcable.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A571F11E8083 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:21:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.663
X-Spam-Level: 
X-Spam-Status: No, score=-0.663 tagged_above=-999 required=5 tests=[AWL=0.800,  BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zwiMmzSzsGvs for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:21:57 -0700 (PDT)
Received: from cdpipgw01.twcable.com (cdpipgw01.twcable.com [165.237.59.22]) by ietfa.amsl.com (Postfix) with ESMTP id 5679011E8079 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 07:21:56 -0700 (PDT)
X-SENDER-IP: 10.136.163.15
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.77,552,1336363200"; d="scan'208";a="407071452"
Received: from unknown (HELO PRVPEXHUB06.corp.twcable.com) ([10.136.163.15]) by cdpipgw01.twcable.com with ESMTP/TLS/RC4-MD5; 09 Jul 2012 10:21:14 -0400
Received: from PRVPEXVS08.corp.twcable.com ([10.136.163.36]) by PRVPEXHUB06.corp.twcable.com ([10.136.163.15]) with mapi; Mon, 9 Jul 2012 10:21:33 -0400
From: "Rogers, Josh" <josh.rogers@twcable.com>
To: balaji venkat Venkataswami <balajivenkat299@gmail.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Date: Mon, 9 Jul 2012 10:21:34 -0400
Subject: Re: L2vpn Digest, Vol 98, Issue 6
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
Thread-Index: Ac1d3iOdDjelgaQmQ8+qv1VIhIuU5w==
Message-ID: <CC2051BD.9402%josh.rogers@twcable.com>
In-Reply-To: <CC1F2A48.5CB9%balajivenkat299@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.2.120421
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 14:21:57 -0000

While I don't necessarily agree with this draft's approach ("security
through obscurity" comes to mind), I'd like to point out that I do see a
need to assuage concerns about using Option C between operators.  In my
part of the world, when I propose Option C to other operators, often the
idea is met with concern/resistance, seemingly because the other operator
has not done it before.  Even internally, many of my colleagues are
concerned about security and the trust model in general.  It appears to
me, to be no different than any other IP peering relationship, which
requires some basic 'trust', albeit not implicit trust.

I think Robert's suggestion of leveraging encryption is a more ironclad
and reasonable solution to the problems presented here.  However, I'd
still like to see an informative 'best practices' document at some point
that covered some basic policies that should be followed when peering with
another ISP for LxVPN exchange.

-Josh



On 7/8/12 1:46 AM, "balaji venkat Venkataswami"
<balajivenkat299@gmail.com> wrote:

>Dear Robert,
>
>As mentioned in the earlier mail the following restriction is imposed on
>the
>Model C deployment=A9
>
>The consequence of this is that in model C the service providers must
>trust each other also in areas that are not shared. Therefore, model C is
>most commonly used today where a single operator uses several ASs on the
>backbone. In this case, implicit trust exists between the ASs because they
>have the same operational control.
>
>
>In order to stretch this scheme to other Ases under different admin
>control this scheme helps out.
>
>Thanks and regards,
>Balaji venkat
>
>On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
>wrote:
>
>>If you have received this digest without all the individual message
>>attachments you will need to update your digest options in your list
>>subscription.  To do so, go to
>>
>>https://www.ietf.org/mailman/listinfo/l2vpn
>>
>>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>>MIME or Plain Text Digests?" to MIME.  You can set this option
>>globally for all the list digests you receive at this point.
>>
>>
>>
>>Send L2vpn mailing list submissions to
>>      l2vpn@ietf.org
>>
>>To subscribe or unsubscribe via the World Wide Web, visit
>>      https://www.ietf.org/mailman/listinfo/l2vpn
>>or, via email, send a message with subject or body 'help' to
>>      l2vpn-request@ietf.org
>>
>>You can reach the person managing the list at
>>      l2vpn-owner@ietf.org
>>
>>When replying, please edit your Subject line so it is more specific
>>than "Re: Contents of L2vpn digest..."
>>
>>
>>Today's Topics:
>>
>>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>      (Robert Raszuk)
>>
>>
>>----------------------------------------------------------------------
>>
>>Message: 1
>>Date: Sat, 07 Jul 2012 14:39:56 +0200
>>From: Robert Raszuk <robert@raszuk.net>
>>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>Message-ID: <4FF82E1C.6000009@raszuk.net>
>>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
>>
>>
>>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>>
>>It proposed an interesting solution to apply algorithmically computed
>>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>>option C is used.
>>
>>However I have a fundamental question .. from who the draft is
>>protecting the inter-as service ?
>>
>>Who other then participating ISPs can spoof a value of VPN label ? If
>>the solution is protecting from ISPs itself then I think it does not
>>help at all as corresponding ISPs/SPs still have full access to their
>>PEs and could inject packets to VPN sites at will.
>>
>>Moreover main issue with option C is not security (at least for the last
>>10+ years). Main issue with option C and MPLS is that participating
>>providers need to inject into each other's network all of their
>>participating PE's /32 addresses so the end to end MPLS LSP can be
>>build. Originally that was recommended to be done by mutual
>>redistribution to the IGP .. now the general recommendation is to use
>>labeled BGP (both IBGP and EBGP).
>>
>>So fundamental question to the authors ... who is the potential
>>attacker/spoofer this draft is aiming to protect from ?
>>
>>Best regards,
>>R.
>>
>>
>>
>>
>>
>>------------------------------
>>
>>_______________________________________________
>>L2vpn mailing list
>>L2vpn@ietf.org
>>https://www.ietf.org/mailman/listinfo/l2vpn
>>
>>
>>End of L2vpn Digest, Vol 98, Issue 6
>>************************************
>
>


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From ju1738@att.com  Mon Jul  9 07:35:41 2012
Return-Path: <ju1738@att.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED87611E8099 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:35:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.309
X-Spam-Level: 
X-Spam-Status: No, score=-106.309 tagged_above=-999 required=5 tests=[AWL=0.290, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a5JBN50vn5S9 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:35:41 -0700 (PDT)
Received: from nbfkord-smmo05.seg.att.com (nbfkord-smmo05.seg.att.com [209.65.160.92]) by ietfa.amsl.com (Postfix) with ESMTP id DB5A211E808F for <l2vpn@ietf.org>; Mon,  9 Jul 2012 07:35:40 -0700 (PDT)
Received: from unknown [144.160.128.153] (EHLO nbfkord-smmo05.seg.att.com) by nbfkord-smmo05.seg.att.com(mxl_mta-6.11.0-10) with ESMTP id 65ceaff4.74fc0940.207638.00-586.546899.nbfkord-smmo05.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 14:36:06 +0000 (UTC)
X-MXL-Hash: 4ffaec56132176b4-a2053a29ca1e2fdd19961adf3501066d2ad1ad11
Received: from unknown [144.160.128.153] (EHLO flpi408.enaf.ffdc.sbc.com) by nbfkord-smmo05.seg.att.com(mxl_mta-6.11.0-10) over TLS secured channel with ESMTP id e4ceaff4.0.207612.00-491.546817.nbfkord-smmo05.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 14:35:59 +0000 (UTC)
X-MXL-Hash: 4ffaec4f3629999b-38561b0caf79031bd01e24946ab86493c40feeef
Received: from enaf.ffdc.sbc.com (localhost.localdomain [127.0.0.1]) by flpi408.enaf.ffdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69EZuaw005842; Mon, 9 Jul 2012 07:35:58 -0700
Received: from fflint03.pst.cso.att.com (fflint03.pst.cso.att.com [150.234.39.63]) by flpi408.enaf.ffdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69EZq1W005755 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 9 Jul 2012 07:35:54 -0700
Received: from MISOUT7MSGHUB9C.ITServices.sbc.com (misout7msghub9c.itservices.sbc.com [144.151.223.82]) by fflint03.pst.cso.att.com (RSA Interceptor); Mon, 9 Jul 2012 07:35:33 -0700
Received: from MISOUT7MSGUSR9I.ITServices.sbc.com ([144.151.223.56]) by MISOUT7MSGHUB9C.ITServices.sbc.com ([144.151.223.82]) with mapi id 14.02.0298.004; Mon, 9 Jul 2012 10:35:32 -0400
From: "UTTARO, JAMES" <ju1738@att.com>
To: "'Rogers, Josh'" <josh.rogers@twcable.com>, balaji venkat Venkataswami <balajivenkat299@gmail.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Subject: RE: L2vpn Digest, Vol 98, Issue 6
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
Thread-Index: Ac1d3iOdVst3wH8vN0uvsrGUCI9bogAAKKdg
Date: Mon, 9 Jul 2012 14:35:31 +0000
Message-ID: <B17A6910EEDD1F45980687268941550FB32995@MISOUT7MSGUSR9I.ITServices.sbc.com>
References: <CC1F2A48.5CB9%balajivenkat299@gmail.com> <CC2051BD.9402%josh.rogers@twcable.com>
In-Reply-To: <CC2051BD.9402%josh.rogers@twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.155.252]
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2010122901)]
X-MAIL-FROM: <ju1738@att.com>
X-SOURCE-IP: [144.160.128.153]
X-AnalysisOut: [v=1.0 c=1 a=gE9O8Arr410A:10 a=9xHMEmg6Re4A:10 a=ofMgfj31e3]
X-AnalysisOut: [cA:10 a=BLceEmwcHowA:10 a=-CRmgG0JhlAA:10 a=xwOvzTHDVLE4u4]
X-AnalysisOut: [nGvK72ag==:17 a=48vgC7mUAAAA:8 a=2clOPd4PAAAA:8 a=pGLkceIS]
X-AnalysisOut: [AAAA:8 a=NHGU_W0H71IkOvVAKAEA:9 a=jiObf9B0YAUA:10 a=lZB815]
X-AnalysisOut: [dzVvQA:10 a=bDUki_mJ7DgA:10 a=MSl-tDqOz04A:10 a=19j6LRxnqm]
X-AnalysisOut: [wKp53E:21 a=X__jf8Lwdhm1_Zpx:21]
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 14:35:42 -0000

Josh,

	Yes quite leery of building an Option C solution to other providers for a =
number of reasons including trust, security but also others i.e RT Mapping,=
 Scale, Protected Infrastructure available to others, IGP Scale ( # of LBs =
), Pri/Back Selection of ASBR, attack on the PEs, etc... Actually the more =
sophisticated the Option C solution the more alignment and possible risk.=20

I understand the ask that this draft is attempting to meet, but does it mak=
e sense to do this without addressing the other facets of building an Optio=
n C solution between different ISPs..

Jim Uttaro




-----Original Message-----
From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of R=
ogers, Josh
Sent: Monday, July 09, 2012 10:22 AM
To: balaji venkat Venkataswami; l2vpn@ietf.org; robert@raszuk.net
Cc: Shankar Raman M J; Bhargav Bhikkaji
Subject: Re: L2vpn Digest, Vol 98, Issue 6

While I don't necessarily agree with this draft's approach ("security
through obscurity" comes to mind), I'd like to point out that I do see a
need to assuage concerns about using Option C between operators.  In my
part of the world, when I propose Option C to other operators, often the
idea is met with concern/resistance, seemingly because the other operator
has not done it before.  Even internally, many of my colleagues are
concerned about security and the trust model in general.  It appears to
me, to be no different than any other IP peering relationship, which
requires some basic 'trust', albeit not implicit trust.

I think Robert's suggestion of leveraging encryption is a more ironclad
and reasonable solution to the problems presented here.  However, I'd
still like to see an informative 'best practices' document at some point
that covered some basic policies that should be followed when peering with
another ISP for LxVPN exchange.

-Josh



On 7/8/12 1:46 AM, "balaji venkat Venkataswami"
<balajivenkat299@gmail.com> wrote:

>Dear Robert,
>
>As mentioned in the earlier mail the following restriction is imposed on
>the
>Model C deployment=A9
>
>The consequence of this is that in model C the service providers must
>trust each other also in areas that are not shared. Therefore, model C is
>most commonly used today where a single operator uses several ASs on the
>backbone. In this case, implicit trust exists between the ASs because they
>have the same operational control.
>
>
>In order to stretch this scheme to other Ases under different admin
>control this scheme helps out.
>
>Thanks and regards,
>Balaji venkat
>
>On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
>wrote:
>
>>If you have received this digest without all the individual message
>>attachments you will need to update your digest options in your list
>>subscription.  To do so, go to
>>
>>https://www.ietf.org/mailman/listinfo/l2vpn
>>
>>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>>MIME or Plain Text Digests?" to MIME.  You can set this option
>>globally for all the list digests you receive at this point.
>>
>>
>>
>>Send L2vpn mailing list submissions to
>>      l2vpn@ietf.org
>>
>>To subscribe or unsubscribe via the World Wide Web, visit
>>      https://www.ietf.org/mailman/listinfo/l2vpn
>>or, via email, send a message with subject or body 'help' to
>>      l2vpn-request@ietf.org
>>
>>You can reach the person managing the list at
>>      l2vpn-owner@ietf.org
>>
>>When replying, please edit your Subject line so it is more specific
>>than "Re: Contents of L2vpn digest..."
>>
>>
>>Today's Topics:
>>
>>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>      (Robert Raszuk)
>>
>>
>>----------------------------------------------------------------------
>>
>>Message: 1
>>Date: Sat, 07 Jul 2012 14:39:56 +0200
>>From: Robert Raszuk <robert@raszuk.net>
>>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>Message-ID: <4FF82E1C.6000009@raszuk.net>
>>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
>>
>>
>>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>>
>>It proposed an interesting solution to apply algorithmically computed
>>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>>option C is used.
>>
>>However I have a fundamental question .. from who the draft is
>>protecting the inter-as service ?
>>
>>Who other then participating ISPs can spoof a value of VPN label ? If
>>the solution is protecting from ISPs itself then I think it does not
>>help at all as corresponding ISPs/SPs still have full access to their
>>PEs and could inject packets to VPN sites at will.
>>
>>Moreover main issue with option C is not security (at least for the last
>>10+ years). Main issue with option C and MPLS is that participating
>>providers need to inject into each other's network all of their
>>participating PE's /32 addresses so the end to end MPLS LSP can be
>>build. Originally that was recommended to be done by mutual
>>redistribution to the IGP .. now the general recommendation is to use
>>labeled BGP (both IBGP and EBGP).
>>
>>So fundamental question to the authors ... who is the potential
>>attacker/spoofer this draft is aiming to protect from ?
>>
>>Best regards,
>>R.
>>
>>
>>
>>
>>
>>------------------------------
>>
>>_______________________________________________
>>L2vpn mailing list
>>L2vpn@ietf.org
>>https://www.ietf.org/mailman/listinfo/l2vpn
>>
>>
>>End of L2vpn Digest, Vol 98, Issue 6
>>************************************
>
>


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From josh.rogers@twcable.com  Mon Jul  9 07:39:38 2012
Return-Path: <josh.rogers@twcable.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAE6E21F8573 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:39:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.063
X-Spam-Level: 
X-Spam-Status: No, score=-1.063 tagged_above=-999 required=5 tests=[AWL=0.400,  BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdK3HbqAtACf for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 07:39:38 -0700 (PDT)
Received: from cdpipgw01.twcable.com (cdpipgw01.twcable.com [165.237.59.22]) by ietfa.amsl.com (Postfix) with ESMTP id 9B6B721F859A for <l2vpn@ietf.org>; Mon,  9 Jul 2012 07:39:37 -0700 (PDT)
X-SENDER-IP: 10.136.163.11
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.77,552,1336363200"; d="scan'208";a="407085806"
Received: from unknown (HELO PRVPEXHUB02.corp.twcable.com) ([10.136.163.11]) by cdpipgw01.twcable.com with ESMTP/TLS/RC4-MD5; 09 Jul 2012 10:39:43 -0400
Received: from PRVPEXVS08.corp.twcable.com ([10.136.163.36]) by PRVPEXHUB02.corp.twcable.com ([10.136.163.11]) with mapi; Mon, 9 Jul 2012 10:40:02 -0400
From: "Rogers, Josh" <josh.rogers@twcable.com>
To: "UTTARO, JAMES" <ju1738@att.com>, balaji venkat Venkataswami <balajivenkat299@gmail.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Date: Mon, 9 Jul 2012 10:40:03 -0400
Subject: Re: L2vpn Digest, Vol 98, Issue 6
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
Thread-Index: Ac1d4LiUFrc7vk4nQiCBpAKv6Ip8Kw==
Message-ID: <CC2056D0.9463%josh.rogers@twcable.com>
In-Reply-To: <B17A6910EEDD1F45980687268941550FB32995@MISOUT7MSGUSR9I.ITServices.sbc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.2.120421
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 14:39:38 -0000

I would propose tabling this draft, and attempting to create a document
outlining 1) how best to establish option C peering with other SP's, and
2) outstanding caveats/exposures that are not addressed with available
technology/standards.

Having such a document would better frame any subsequent 'solution' drafts
that address concerns not currently addressable with good policy/practice.

-josh


On 7/9/12 9:35 AM, "UTTARO, JAMES" <ju1738@att.com> wrote:

>Josh,
>
>       Yes quite leery of building an Option C solution to other providers=
 for
>a number of reasons including trust, security but also others i.e RT
>Mapping, Scale, Protected Infrastructure available to others, IGP Scale (
># of LBs ), Pri/Back Selection of ASBR, attack on the PEs, etc...
>Actually the more sophisticated the Option C solution the more alignment
>and possible risk.
>
>I understand the ask that this draft is attempting to meet, but does it
>make sense to do this without addressing the other facets of building an
>Option C solution between different ISPs..
>
>Jim Uttaro
>
>
>
>
>-----Original Message-----
>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of
>Rogers, Josh
>Sent: Monday, July 09, 2012 10:22 AM
>To: balaji venkat Venkataswami; l2vpn@ietf.org; robert@raszuk.net
>Cc: Shankar Raman M J; Bhargav Bhikkaji
>Subject: Re: L2vpn Digest, Vol 98, Issue 6
>
>While I don't necessarily agree with this draft's approach ("security
>through obscurity" comes to mind), I'd like to point out that I do see a
>need to assuage concerns about using Option C between operators.  In my
>part of the world, when I propose Option C to other operators, often the
>idea is met with concern/resistance, seemingly because the other operator
>has not done it before.  Even internally, many of my colleagues are
>concerned about security and the trust model in general.  It appears to
>me, to be no different than any other IP peering relationship, which
>requires some basic 'trust', albeit not implicit trust.
>
>I think Robert's suggestion of leveraging encryption is a more ironclad
>and reasonable solution to the problems presented here.  However, I'd
>still like to see an informative 'best practices' document at some point
>that covered some basic policies that should be followed when peering with
>another ISP for LxVPN exchange.
>
>-Josh
>
>
>
>On 7/8/12 1:46 AM, "balaji venkat Venkataswami"
><balajivenkat299@gmail.com> wrote:
>
>>Dear Robert,
>>
>>As mentioned in the earlier mail the following restriction is imposed on
>>the
>>Model C deployment=A9
>>
>>The consequence of this is that in model C the service providers must
>>trust each other also in areas that are not shared. Therefore, model C is
>>most commonly used today where a single operator uses several ASs on the
>>backbone. In this case, implicit trust exists between the ASs because
>>they
>>have the same operational control.
>>
>>
>>In order to stretch this scheme to other Ases under different admin
>>control this scheme helps out.
>>
>>Thanks and regards,
>>Balaji venkat
>>
>>On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
>>wrote:
>>
>>>If you have received this digest without all the individual message
>>>attachments you will need to update your digest options in your list
>>>subscription.  To do so, go to
>>>
>>>https://www.ietf.org/mailman/listinfo/l2vpn
>>>
>>>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>>>MIME or Plain Text Digests?" to MIME.  You can set this option
>>>globally for all the list digests you receive at this point.
>>>
>>>
>>>
>>>Send L2vpn mailing list submissions to
>>>      l2vpn@ietf.org
>>>
>>>To subscribe or unsubscribe via the World Wide Web, visit
>>>      https://www.ietf.org/mailman/listinfo/l2vpn
>>>or, via email, send a message with subject or body 'help' to
>>>      l2vpn-request@ietf.org
>>>
>>>You can reach the person managing the list at
>>>      l2vpn-owner@ietf.org
>>>
>>>When replying, please edit your Subject line so it is more specific
>>>than "Re: Contents of L2vpn digest..."
>>>
>>>
>>>Today's Topics:
>>>
>>>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>>      (Robert Raszuk)
>>>
>>>
>>>----------------------------------------------------------------------
>>>
>>>Message: 1
>>>Date: Sat, 07 Jul 2012 14:39:56 +0200
>>>From: Robert Raszuk <robert@raszuk.net>
>>>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>>>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>>Message-ID: <4FF82E1C.6000009@raszuk.net>
>>>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
>>>
>>>
>>>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>>>
>>>It proposed an interesting solution to apply algorithmically computed
>>>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>>>option C is used.
>>>
>>>However I have a fundamental question .. from who the draft is
>>>protecting the inter-as service ?
>>>
>>>Who other then participating ISPs can spoof a value of VPN label ? If
>>>the solution is protecting from ISPs itself then I think it does not
>>>help at all as corresponding ISPs/SPs still have full access to their
>>>PEs and could inject packets to VPN sites at will.
>>>
>>>Moreover main issue with option C is not security (at least for the last
>>>10+ years). Main issue with option C and MPLS is that participating
>>>providers need to inject into each other's network all of their
>>>participating PE's /32 addresses so the end to end MPLS LSP can be
>>>build. Originally that was recommended to be done by mutual
>>>redistribution to the IGP .. now the general recommendation is to use
>>>labeled BGP (both IBGP and EBGP).
>>>
>>>So fundamental question to the authors ... who is the potential
>>>attacker/spoofer this draft is aiming to protect from ?
>>>
>>>Best regards,
>>>R.
>>>
>>>
>>>
>>>
>>>
>>>------------------------------
>>>
>>>_______________________________________________
>>>L2vpn mailing list
>>>L2vpn@ietf.org
>>>https://www.ietf.org/mailman/listinfo/l2vpn
>>>
>>>
>>>End of L2vpn Digest, Vol 98, Issue 6
>>>************************************
>>
>>
>
>
>This E-mail and any of its attachments may contain Time Warner Cable
>proprietary information, which is privileged, confidential, or subject to
>copyright belonging to Time Warner Cable. This E-mail is intended solely
>for the use of the individual or entity to which it is addressed. If you
>are not the intended recipient of this E-mail, you are hereby notified
>that any dissemination, distribution, copying, or action taken in
>relation to the contents of and attachments to this E-mail is strictly
>prohibited and may be unlawful. If you have received this E-mail in
>error, please notify the sender immediately and permanently delete the
>original and any copy of this E-mail and any printout.


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From balajivenkat299@gmail.com  Mon Jul  9 08:09:58 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A02EF11E80A4 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 08:09:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.523
X-Spam-Level: 
X-Spam-Status: No, score=-3.523 tagged_above=-999 required=5 tests=[AWL=0.075,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07i2shzJen2a for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 08:09:57 -0700 (PDT)
Received: from mail-gg0-f172.google.com (mail-gg0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id EE25811E80A1 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 08:09:56 -0700 (PDT)
Received: by ggnc4 with SMTP id c4so11171763ggn.31 for <l2vpn@ietf.org>; Mon, 09 Jul 2012 08:10:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=s5DYlj3Y6dxHUgNLSRr4qDy2QA6X3dQ8T+1PzxzPaSQ=; b=Ii5fJPcLXGyzOlyFeHJaPbckQlYCEfrxsXXLkrXP1718j0TIG9tlkLSKMWfozitIxt 5KdeTAPTHuBQWIWOk37JPEcKwIW95m/+USGeYrDZzngNm1HwCRU9uAS5rvQ59iy10e9C LybwdWItvYVKSmG5WASHRqrm9Reg2F721OBpsfxBGjV+fXIbLtJ1BFw3HL52Qp3UKmHh rS+N79XFgRJ25kl8oJUdDoIvBScHTOUFk2Bw10ocbjz5U9ns3taHT2BYPw1nBDL9E0H0 9xHs38FItyAy8ePTe7nnoJf3ivAcbvV5O6NHmrKg4qZnaPN+2CPmtLhPhaxqn++fktRV E7GQ==
MIME-Version: 1.0
Received: by 10.68.211.193 with SMTP id ne1mr20721203pbc.142.1341846620571; Mon, 09 Jul 2012 08:10:20 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 08:10:20 -0700 (PDT)
In-Reply-To: <CC2051BD.9402%josh.rogers@twcable.com>
References: <CC1F2A48.5CB9%balajivenkat299@gmail.com> <CC2051BD.9402%josh.rogers@twcable.com>
Date: Mon, 9 Jul 2012 20:40:20 +0530
Message-ID: <CAHF4apMcRqSR12o5ckwHRS43b78oTeBn6rna46A1nieJ7ip+bg@mail.gmail.com>
Subject: Re: L2vpn Digest, Vol 98, Issue 6
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: "Rogers, Josh" <josh.rogers@twcable.com>
Content-Type: multipart/alternative; boundary=e89a8fb208e8298a4404c4670393
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 15:09:58 -0000

--e89a8fb208e8298a4404c4670393
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Dear Josh, Robert,

We had considered the option of IPsec. With respect to encrypting and
decrypting at data rates that high we saw issues with respect to
computation and power and time as well. While this may be ok for today's
network speeds the higher speeds that would be achieved in future would
effectively create the above complexity issues if it was done on the PE
router (ingress and egress). While the CE based encryption might work,
spoofing attacks and other unidirectional attacks may send garbled packets
which will be sought to be decrypted thereby DOSing any decryptor. This
would be counterproductive.

Also the inner label of a Option-C inter-AS MPLS VPN packet cannot be
encrypted. If found to belong to a specific VPN that is of interest to the
tapper/eavesdropper he can still take the traffic based on that label and
decrypt it later on.

The proposed scheme in the internet draft makes it difficult to even
identify which label belongs to which VPN. Even if identified for a label
amongst the set of labels, in order for the tapper to get all the traffic
he / she has to guess all the labels, their respective time slices and in
addition the innermost label which is digest whose algorithm has to be
again guessed. So the proposed scheme provides several lines of defence
against spoofing, unidirectional attacks and even eavesdropping.

thanks and regards,
balaji, shankar and bhargav

On Mon, Jul 9, 2012 at 7:51 PM, Rogers, Josh <josh.rogers@twcable.com>wrote=
:

> While I don't necessarily agree with this draft's approach ("security
> through obscurity" comes to mind), I'd like to point out that I do see a
> need to assuage concerns about using Option C between operators.  In my
> part of the world, when I propose Option C to other operators, often the
> idea is met with concern/resistance, seemingly because the other operator
> has not done it before.  Even internally, many of my colleagues are
> concerned about security and the trust model in general.  It appears to
> me, to be no different than any other IP peering relationship, which
> requires some basic 'trust', albeit not implicit trust.
>
> I think Robert's suggestion of leveraging encryption is a more ironclad
> and reasonable solution to the problems presented here.  However, I'd
> still like to see an informative 'best practices' document at some point
> that covered some basic policies that should be followed when peering wit=
h
> another ISP for LxVPN exchange.
>
> -Josh
>
>
>
> On 7/8/12 1:46 AM, "balaji venkat Venkataswami"
> <balajivenkat299@gmail.com> wrote:
>
> >Dear Robert,
> >
> >As mentioned in the earlier mail the following restriction is imposed on
> >the
> >Model C deployment=C5=A0
> >
> >The consequence of this is that in model C the service providers must
> >trust each other also in areas that are not shared. Therefore, model C i=
s
> >most commonly used today where a single operator uses several ASs on the
> >backbone. In this case, implicit trust exists between the ASs because th=
ey
> >have the same operational control.
> >
> >
> >In order to stretch this scheme to other Ases under different admin
> >control this scheme helps out.
> >
> >Thanks and regards,
> >Balaji venkat
> >
> >On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
> >wrote:
> >
> >>If you have received this digest without all the individual message
> >>attachments you will need to update your digest options in your list
> >>subscription.  To do so, go to
> >>
> >>https://www.ietf.org/mailman/listinfo/l2vpn
> >>
> >>Click the 'Unsubscribe or edit options' button, log in, and set "Get
> >>MIME or Plain Text Digests?" to MIME.  You can set this option
> >>globally for all the list digests you receive at this point.
> >>
> >>
> >>
> >>Send L2vpn mailing list submissions to
> >>      l2vpn@ietf.org
> >>
> >>To subscribe or unsubscribe via the World Wide Web, visit
> >>      https://www.ietf.org/mailman/listinfo/l2vpn
> >>or, via email, send a message with subject or body 'help' to
> >>      l2vpn-request@ietf.org
> >>
> >>You can reach the person managing the list at
> >>      l2vpn-owner@ietf.org
> >>
> >>When replying, please edit your Subject line so it is more specific
> >>than "Re: Contents of L2vpn digest..."
> >>
> >>
> >>Today's Topics:
> >>
> >>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
> >>      (Robert Raszuk)
> >>
> >>
> >>----------------------------------------------------------------------
> >>
> >>Message: 1
> >>Date: Sat, 07 Jul 2012 14:39:56 +0200
> >>From: Robert Raszuk <robert@raszuk.net>
> >>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
> >>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
> >>Message-ID: <4FF82E1C.6000009@raszuk.net>
> >>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
> >>
> >>
> >>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
> >>
> >>It proposed an interesting solution to apply algorithmically computed
> >>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
> >>option C is used.
> >>
> >>However I have a fundamental question .. from who the draft is
> >>protecting the inter-as service ?
> >>
> >>Who other then participating ISPs can spoof a value of VPN label ? If
> >>the solution is protecting from ISPs itself then I think it does not
> >>help at all as corresponding ISPs/SPs still have full access to their
> >>PEs and could inject packets to VPN sites at will.
> >>
> >>Moreover main issue with option C is not security (at least for the las=
t
> >>10+ years). Main issue with option C and MPLS is that participating
> >>providers need to inject into each other's network all of their
> >>participating PE's /32 addresses so the end to end MPLS LSP can be
> >>build. Originally that was recommended to be done by mutual
> >>redistribution to the IGP .. now the general recommendation is to use
> >>labeled BGP (both IBGP and EBGP).
> >>
> >>So fundamental question to the authors ... who is the potential
> >>attacker/spoofer this draft is aiming to protect from ?
> >>
> >>Best regards,
> >>R.
> >>
> >>
> >>
> >>
> >>
> >>------------------------------
> >>
> >>_______________________________________________
> >>L2vpn mailing list
> >>L2vpn@ietf.org
> >>https://www.ietf.org/mailman/listinfo/l2vpn
> >>
> >>
> >>End of L2vpn Digest, Vol 98, Issue 6
> >>************************************
> >
> >
>
>
> This E-mail and any of its attachments may contain Time Warner Cable
> proprietary information, which is privileged, confidential, or subject to
> copyright belonging to Time Warner Cable. This E-mail is intended solely
> for the use of the individual or entity to which it is addressed. If you
> are not the intended recipient of this E-mail, you are hereby notified th=
at
> any dissemination, distribution, copying, or action taken in relation to
> the contents of and attachments to this E-mail is strictly prohibited and
> may be unlawful. If you have received this E-mail in error, please notify
> the sender immediately and permanently delete the original and any copy o=
f
> this E-mail and any printout.
>

--e89a8fb208e8298a4404c4670393
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Dear Josh, Robert,<div><br></div><div>We had considered the option of IPsec=
. With respect to encrypting and decrypting at data rates that high we saw =
issues with respect to computation and power and time as well. While this m=
ay be ok for today&#39;s network speeds the higher speeds that would be ach=
ieved in future would effectively create the above complexity issues if it =
was done on the PE router (ingress and egress). While the CE based encrypti=
on might work, spoofing attacks and other unidirectional attacks may send g=
arbled packets which will be sought to be decrypted thereby DOSing any decr=
yptor. This would be counterproductive.</div>
<div><br></div><div>Also the inner label of a Option-C inter-AS MPLS VPN pa=
cket cannot be encrypted. If found to belong to a specific VPN that is of i=
nterest to the tapper/eavesdropper he can still take the traffic based on t=
hat label and decrypt it later on.</div>
<div><br></div><div>The proposed scheme in the internet draft makes it diff=
icult to even identify which label belongs to which VPN. Even if identified=
 for a label amongst the set of labels, in order for the tapper to get all =
the traffic he / she has to guess all the labels, their respective time sli=
ces and in addition the innermost label which is digest whose algorithm has=
 to be again guessed. So the proposed scheme provides several lines of defe=
nce against spoofing, unidirectional attacks and even eavesdropping.<br>
<br>thanks and regards,</div><div>balaji, shankar and bhargav<br><br><div c=
lass=3D"gmail_quote">On Mon, Jul 9, 2012 at 7:51 PM, Rogers, Josh <span dir=
=3D"ltr">&lt;<a href=3D"mailto:josh.rogers@twcable.com" target=3D"_blank">j=
osh.rogers@twcable.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">While I don&#39;t necessarily agree with thi=
s draft&#39;s approach (&quot;security<br>
through obscurity&quot; comes to mind), I&#39;d like to point out that I do=
 see a<br>
need to assuage concerns about using Option C between operators. =C2=A0In m=
y<br>
part of the world, when I propose Option C to other operators, often the<br=
>
idea is met with concern/resistance, seemingly because the other operator<b=
r>
has not done it before. =C2=A0Even internally, many of my colleagues are<br=
>
concerned about security and the trust model in general. =C2=A0It appears t=
o<br>
me, to be no different than any other IP peering relationship, which<br>
requires some basic &#39;trust&#39;, albeit not implicit trust.<br>
<br>
I think Robert&#39;s suggestion of leveraging encryption is a more ironclad=
<br>
and reasonable solution to the problems presented here. =C2=A0However, I&#3=
9;d<br>
still like to see an informative &#39;best practices&#39; document at some =
point<br>
that covered some basic policies that should be followed when peering with<=
br>
another ISP for LxVPN exchange.<br>
<br>
-Josh<br>
<br>
<br>
<br>
On 7/8/12 1:46 AM, &quot;balaji venkat Venkataswami&quot;<br>
<div><div class=3D"h5">&lt;<a href=3D"mailto:balajivenkat299@gmail.com">bal=
ajivenkat299@gmail.com</a>&gt; wrote:<br>
<br>
&gt;Dear Robert,<br>
&gt;<br>
&gt;As mentioned in the earlier mail the following restriction is imposed o=
n<br>
&gt;the<br>
&gt;Model C deployment=C5=A0<br>
&gt;<br>
&gt;The consequence of this is that in model C the service providers must<b=
r>
&gt;trust each other also in areas that are not shared. Therefore, model C =
is<br>
&gt;most commonly used today where a single operator uses several ASs on th=
e<br>
&gt;backbone. In this case, implicit trust exists between the ASs because t=
hey<br>
&gt;have the same operational control.<br>
&gt;<br>
&gt;<br>
&gt;In order to stretch this scheme to other Ases under different admin<br>
&gt;control this scheme helps out.<br>
&gt;<br>
&gt;Thanks and regards,<br>
&gt;Balaji venkat<br>
&gt;<br>
&gt;On 08/07/12 12:30 AM, &quot;<a href=3D"mailto:l2vpn-request@ietf.org">l=
2vpn-request@ietf.org</a>&quot; &lt;<a href=3D"mailto:l2vpn-request@ietf.or=
g">l2vpn-request@ietf.org</a>&gt;<br>
&gt;wrote:<br>
&gt;<br>
&gt;&gt;If you have received this digest without all the individual message=
<br>
&gt;&gt;attachments you will need to update your digest options in your lis=
t<br>
&gt;&gt;subscription. =C2=A0To do so, go to<br>
&gt;&gt;<br>
&gt;&gt;<a href=3D"https://www.ietf.org/mailman/listinfo/l2vpn" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/l2vpn</a><br>
&gt;&gt;<br>
&gt;&gt;Click the &#39;Unsubscribe or edit options&#39; button, log in, and=
 set &quot;Get<br>
&gt;&gt;MIME or Plain Text Digests?&quot; to MIME. =C2=A0You can set this o=
ption<br>
&gt;&gt;globally for all the list digests you receive at this point.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;Send L2vpn mailing list submissions to<br>
&gt;&gt; =C2=A0 =C2=A0 =C2=A0<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.o=
rg</a><br>
&gt;&gt;<br>
&gt;&gt;To subscribe or unsubscribe via the World Wide Web, visit<br>
&gt;&gt; =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.org/mailman/listin=
fo/l2vpn" target=3D"_blank">https://www.ietf.org/mailman/listinfo/l2vpn</a>=
<br>
&gt;&gt;or, via email, send a message with subject or body &#39;help&#39; t=
o<br>
&gt;&gt; =C2=A0 =C2=A0 =C2=A0<a href=3D"mailto:l2vpn-request@ietf.org">l2vp=
n-request@ietf.org</a><br>
&gt;&gt;<br>
&gt;&gt;You can reach the person managing the list at<br>
&gt;&gt; =C2=A0 =C2=A0 =C2=A0<a href=3D"mailto:l2vpn-owner@ietf.org">l2vpn-=
owner@ietf.org</a><br>
&gt;&gt;<br>
&gt;&gt;When replying, please edit your Subject line so it is more specific=
<br>
&gt;&gt;than &quot;Re: Contents of L2vpn digest...&quot;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;Today&#39;s Topics:<br>
&gt;&gt;<br>
&gt;&gt; =C2=A0 1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<br=
>
&gt;&gt; =C2=A0 =C2=A0 =C2=A0(Robert Raszuk)<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;-------------------------------------------------------------------=
---<br>
&gt;&gt;<br>
&gt;&gt;Message: 1<br>
&gt;&gt;Date: Sat, 07 Jul 2012 14:39:56 +0200<br>
&gt;&gt;From: Robert Raszuk &lt;<a href=3D"mailto:robert@raszuk.net">robert=
@raszuk.net</a>&gt;<br>
&gt;&gt;To: &quot;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.org</a>&quot=
; &lt;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.org</a>&gt;<br>
&gt;&gt;Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<br>
&gt;&gt;Message-ID: &lt;<a href=3D"mailto:4FF82E1C.6000009@raszuk.net">4FF8=
2E1C.6000009@raszuk.net</a>&gt;<br>
&gt;&gt;Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.<=
br>
&gt;&gt;<br>
&gt;&gt;It proposed an interesting solution to apply algorithmically comput=
ed<br>
&gt;&gt;VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as<=
br>
&gt;&gt;option C is used.<br>
&gt;&gt;<br>
&gt;&gt;However I have a fundamental question .. from who the draft is<br>
&gt;&gt;protecting the inter-as service ?<br>
&gt;&gt;<br>
&gt;&gt;Who other then participating ISPs can spoof a value of VPN label ? =
If<br>
&gt;&gt;the solution is protecting from ISPs itself then I think it does no=
t<br>
&gt;&gt;help at all as corresponding ISPs/SPs still have full access to the=
ir<br>
&gt;&gt;PEs and could inject packets to VPN sites at will.<br>
&gt;&gt;<br>
&gt;&gt;Moreover main issue with option C is not security (at least for the=
 last<br>
&gt;&gt;10+ years). Main issue with option C and MPLS is that participating=
<br>
&gt;&gt;providers need to inject into each other&#39;s network all of their=
<br>
&gt;&gt;participating PE&#39;s /32 addresses so the end to end MPLS LSP can=
 be<br>
&gt;&gt;build. Originally that was recommended to be done by mutual<br>
&gt;&gt;redistribution to the IGP .. now the general recommendation is to u=
se<br>
&gt;&gt;labeled BGP (both IBGP and EBGP).<br>
&gt;&gt;<br>
&gt;&gt;So fundamental question to the authors ... who is the potential<br>
&gt;&gt;attacker/spoofer this draft is aiming to protect from ?<br>
&gt;&gt;<br>
&gt;&gt;Best regards,<br>
&gt;&gt;R.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;------------------------------<br>
&gt;&gt;<br>
&gt;&gt;_______________________________________________<br>
&gt;&gt;L2vpn mailing list<br>
&gt;&gt;<a href=3D"mailto:L2vpn@ietf.org">L2vpn@ietf.org</a><br>
&gt;&gt;<a href=3D"https://www.ietf.org/mailman/listinfo/l2vpn" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/l2vpn</a><br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;End of L2vpn Digest, Vol 98, Issue 6<br>
&gt;&gt;************************************<br>
&gt;<br>
&gt;<br>
<br>
<br>
</div></div>This E-mail and any of its attachments may contain Time Warner =
Cable proprietary information, which is privileged, confidential, or subjec=
t to copyright belonging to Time Warner Cable. This E-mail is intended sole=
ly for the use of the individual or entity to which it is addressed. If you=
 are not the intended recipient of this E-mail, you are hereby notified tha=
t any dissemination, distribution, copying, or action taken in relation to =
the contents of and attachments to this E-mail is strictly prohibited and m=
ay be unlawful. If you have received this E-mail in error, please notify th=
e sender immediately and permanently delete the original and any copy of th=
is E-mail and any printout.<br>

</blockquote></div><br></div>

--e89a8fb208e8298a4404c4670393--

From balajivenkat299@gmail.com  Mon Jul  9 08:46:43 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 596AF11E80E6; Mon,  9 Jul 2012 08:46:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.538
X-Spam-Level: 
X-Spam-Status: No, score=-3.538 tagged_above=-999 required=5 tests=[AWL=0.060,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u+gnc634ta8J; Mon,  9 Jul 2012 08:46:42 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 57E3C11E80E1; Mon,  9 Jul 2012 08:46:42 -0700 (PDT)
Received: by yhq56 with SMTP id 56so12796079yhq.31 for <multiple recipients>; Mon, 09 Jul 2012 08:47:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=v84J3gYn1WKSMDFsLG6o/9fE8IR9D+Tsc0NsH4i178c=; b=VKGJt9oCtI5/Hdyz6NAM2ed40ZlMrYXGmFZDdeFJ5fzGwVQWFMZNJrIZlNudu4lSVL 8Y0hs7+641xl0dcFljOyaKOPWGZRWIFVOedTinNGes1zpZ4MRIhRxFAskG/HRp4jUXgn cNh8k8ygnQ3JpZW8OAKO5crRr3Jt+SQO0GtZ99aFdZsZ3WS3olZynOnxygF3AvWw1C0i kGR2w4nyTnY/Qw5YpI6nlr6ipPxQOTtjgPeB3Ns2ppYoOBGz/9pJkd6brZLy6N1acCSM CLYXhId9KOLdPXeqcAVhGaJ+womH0/TcSHRPcZigKgs6NPzmPD1c/LDSYgQG2AxL2MEU 7yuA==
MIME-Version: 1.0
Received: by 10.68.195.198 with SMTP id ig6mr61976472pbc.92.1341848826698; Mon, 09 Jul 2012 08:47:06 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 08:47:06 -0700 (PDT)
In-Reply-To: <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com>
Date: Mon, 9 Jul 2012 21:17:06 +0530
Message-ID: <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: Tal Mizrahi <talmi@marvell.com>
Content-Type: multipart/alternative; boundary=047d7b10c8a7a85e1a04c467867d
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 15:46:43 -0000

--047d7b10c8a7a85e1a04c467867d
Content-Type: text/plain; charset=ISO-8859-1

Dear Tal,

Comments inline

On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com> wrote:

> Hi Balaji,
>
> A few clarification questions - I think it would be good to clarify these
> issues in the draft:
> 1.      Since the label hopping mechanism relies on PTP, I understand that
> PTP traffic itself does not use label hopping, right?
>

The PTP traffic itself does not use label hopping.


> 2.      Is there something preventing the attacker from attacking PTP,
> thus causing DoS to the data plane?
>

It would be difficult for the attacker to identify which LSP is the PTP LSP
for a specific VPN traffic (flow / set of flows) that is protected by this
scheme. There is no information except on the ingress and egress PEs that
identifies which is the PTP LSP for a particular VPN traffic protected by
this scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV)
> computed over part of the packet header?
>

It serves as a digest from which certain specific bits are chosen to become
the innermost label. Which bits are chosen depends upon the bitmask
exchanged during the control plane.


> 4.      Is there something in your approach that would prevent an attacker
> from a replay attack?
>

For a reply attack to succeed, the replay should time the labels correctly
otherwise the traffic gets rejected.

5.      Looking at "Algorithm 3" I was not sure: does the receiver check
> two consequent time slots? I could not see such a check. I am referring to
> a case where the sender transmits at the end of a time slot, and the packet
> is received at the beginning of the next time slot. That would mean the
> receiver has to be able to tolerate two concurrent time slots, right?
>

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm.
Maybe a little more fine tuning is required on this.


> 6.      The security parameters K, TS, A, I are exchanged over a secure
> link, which basically assumes there is a pre-shared key between the peer
> PEs. A naive question would be: how is your approach better than just using
> a standard ICV, based on the existing pre-shared key?
>

While the ICV may protect against modification of the inner payload one
cannot prevent spoofing attacks if the algorithm for the ICV is deduced.
Our scheme provides facility to change the labels from time slice to time
slice so that guessing what packet belongs to which VPN traffic itself
becomes difficult. This is the first line of defense. If we provide ICV
alone we protect against modification but not with replay attacks. The
proposed scheme protects against VPN traffic identification (so replay
attacks cannot be made) and modification as well through the ICV which is
the innermost label.

thanks and regards,
balaji , shankar and bhargav

>
> Tal.
>
>

--047d7b10c8a7a85e1a04c467867d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear Tal,<div><br></div><div>Comments inline<br><br><div class=3D"gmail_quo=
te">On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:talmi@marvell.com" target=3D"_blank">talmi@marvell.com</a>&gt=
;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi Balaji,<br>
<br>
A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:<br>
1. =A0 =A0 =A0Since the label hopping mechanism relies on PTP, I understand=
 that PTP traffic itself does not use label hopping, right?<br></blockquote=
><div><br></div><div>The PTP traffic itself does not use label hopping.</di=
v>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
2. =A0 =A0 =A0Is there something preventing the attacker from attacking PTP=
, thus causing DoS to the data plane?<br></blockquote><div><br></div><div>I=
t would be difficult for the attacker to identify which LSP is the PTP LSP =
for a specific VPN traffic (flow / set of flows) that is protected by this =
scheme. There is no information except on the ingress and egress PEs that i=
dentifies which is the PTP LSP for a particular VPN traffic protected by th=
is scheme.=A0</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
3. =A0 =A0 =A0Is the &quot;additional label&quot; similar to an Integrity C=
heck Value (ICV) computed over part of the packet header?<br></blockquote><=
div><br></div><div>It serves as a digest from which certain specific bits a=
re chosen to become the innermost label. Which bits are chosen depends upon=
 the bitmask exchanged during the control plane.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
4. =A0 =A0 =A0Is there something in your approach that would prevent an att=
acker from a replay attack?<br></blockquote><div><br></div><div>For a reply=
 attack to succeed, the replay should time the labels correctly otherwise t=
he traffic gets rejected.</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
5. =A0 =A0 =A0Looking at &quot;Algorithm 3&quot; I was not sure: does the r=
eceiver check two consequent time slots? I could not see such a check. I am=
 referring to a case where the sender transmits at the end of a time slot, =
and the packet is received at the beginning of the next time slot. That wou=
ld mean the receiver has to be able to tolerate two concurrent time slots, =
right?<br>
</blockquote><div><br></div><div>Yes. It is available as +or- 1 unit (usual=
ly seconds) in the algorithm. Maybe a little more fine tuning is required o=
n this.</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

6. =A0 =A0 =A0The security parameters K, TS, A, I are exchanged over a secu=
re link, which basically assumes there is a pre-shared key between the peer=
 PEs. A naive question would be: how is your approach better than just usin=
g a standard ICV, based on the existing pre-shared key?<br>
</blockquote><div><br></div><div>While the ICV may protect against modifica=
tion of the inner payload one cannot prevent spoofing attacks if the algori=
thm for the ICV is deduced. Our scheme provides facility to change the labe=
ls from time slice to time slice so that guessing what packet belongs to wh=
ich VPN traffic itself becomes difficult. This is the first line of defense=
. If we provide ICV alone we protect against modification but not with repl=
ay attacks. The proposed scheme protects against VPN traffic identification=
 (so replay attacks cannot be made) and modification as well through the IC=
V which is the innermost label.</div>
<div><br></div><div>thanks and regards,</div><div>balaji , shankar and bhar=
gav</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex">
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
Tal.<br>
<br>
</font></span></blockquote></div><br></div>

--047d7b10c8a7a85e1a04c467867d--

From robert@raszuk.net  Mon Jul  9 08:47:01 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17C6911E80F2 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 08:47:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.568
X-Spam-Level: 
X-Spam-Status: No, score=-2.568 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RatPjVB5BwuG for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 08:47:00 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 31D9D11E80F3 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 08:47:00 -0700 (PDT)
Received: (qmail 32133 invoked by uid 399); 9 Jul 2012 15:47:25 -0000
Received: from unknown (HELO ?192.168.1.91?) (pbs:robert@raszuk.net@83.31.219.81) by mail1310.opentransfer.com with ESMTPM; 9 Jul 2012 15:47:25 -0000
X-Originating-IP: 83.31.219.81
Message-ID: <4FFAFD0B.4070102@raszuk.net>
Date: Mon, 09 Jul 2012 17:47:23 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: L2vpn Digest, Vol 98, Issue 6
References: <CC1F2A48.5CB9%balajivenkat299@gmail.com> <CC2051BD.9402%josh.rogers@twcable.com> <CAHF4apMcRqSR12o5ckwHRS43b78oTeBn6rna46A1nieJ7ip+bg@mail.gmail.com>
In-Reply-To: <CAHF4apMcRqSR12o5ckwHRS43b78oTeBn6rna46A1nieJ7ip+bg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 15:47:01 -0000

Hi Balaji,

 > Dear Josh, Robert,
>
> We had considered the option of IPsec. With respect to encrypting and
> decrypting at data rates that high we saw issues with respect to
> computation and power and time as well. While this may be ok for today's
> network speeds the higher speeds that would be achieved in future would
> effectively create the above complexity issues if it was done on the PE
> router (ingress and egress). While the CE based encryption might work,
> spoofing attacks and other unidirectional attacks may send garbled
> packets which will be sought to be decrypted thereby DOSing any
> decryptor. This would be counterproductive.

The ASBR - ASBR local link encryption does not suffer from any of the 
above.


> Also the inner label of a Option-C inter-AS MPLS VPN packet cannot be
> encrypted. If found to belong to a specific VPN that is of interest to
> the tapper/eavesdropper he can still take the traffic based on that
> label and decrypt it later on.
>
> The proposed scheme in the internet draft makes it difficult to even
> identify which label belongs to which VPN. Even if identified for a
> label amongst the set of labels, in order for the tapper to get all the
> traffic he / she has to guess all the labels, their respective time
> slices and in addition the innermost label which is digest whose
> algorithm has to be again guessed. So the proposed scheme provides
> several lines of defence against spoofing, unidirectional attacks and
> even eavesdropping.


In the same time the proposed scheme makes the troubleshooting 
impossible. How ISPs would decode that for some option C VPNs their 
customer packets go via ASBR to ASBR link or not ?

Same for billing. To the best of my knowledge ISPs charge differently 
for the portion of inter-as service. There is need to provide on a per 
VPN stats from ASBR router. How in this scheme per VPN granularity of 
traffic statistics will be accomplished for billing purposes ? That's 
actually one of the key reasons for option B popularity today.

Thx,
R.







>
> thanks and regards,
> balaji, shankar and bhargav



From balajivenkat299@gmail.com  Mon Jul  9 09:00:07 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE18B11E80B3 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:00:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.548
X-Spam-Level: 
X-Spam-Status: No, score=-3.548 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id URZ14BXjDtlX for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:00:05 -0700 (PDT)
Received: from mail-gg0-f172.google.com (mail-gg0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 7E3AE11E8097 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 09:00:05 -0700 (PDT)
Received: by ggnc4 with SMTP id c4so11234577ggn.31 for <l2vpn@ietf.org>; Mon, 09 Jul 2012 09:00:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ldAHv1k4vHyeUbHJMfRWjbw9XnGv6SY82EaQ1jt2+EQ=; b=Ao2K7pjIaxvVuaE4CKPKtlLKksqaoVbnOe9MRmH+iS26ALKyfEiyWc8UzEZckgHQqC PAYKP91OkHG+nb1r2eze2A3rM4Ix7EtrcSifok5DqIqBhoN9ClrxIOdb81zQ/SusxM3X 8p+WV6y8KX9/AOyzp41sy0zaNK2dVOdKq7HDOesAbOcXZHUIPs2WMJVqB+QW7BhMOuoN eFiGtwW7pVbj6IXfLn+f/0KsY/t1CGKshjGbjy2XjMmx+6HKVRYzY84GEFyarOBkn+lk nTA1htgQQR8Rah22lCoHmv1w8X3zhfgpLw0KHV5ryP2uSmx16FkNSQHMhQAi3B7+LT2Y Ekbg==
MIME-Version: 1.0
Received: by 10.68.134.201 with SMTP id pm9mr62598539pbb.49.1341849629948; Mon, 09 Jul 2012 09:00:29 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 09:00:29 -0700 (PDT)
In-Reply-To: <4FFAFD0B.4070102@raszuk.net>
References: <CC1F2A48.5CB9%balajivenkat299@gmail.com> <CC2051BD.9402%josh.rogers@twcable.com> <CAHF4apMcRqSR12o5ckwHRS43b78oTeBn6rna46A1nieJ7ip+bg@mail.gmail.com> <4FFAFD0B.4070102@raszuk.net>
Date: Mon, 9 Jul 2012 21:30:29 +0530
Message-ID: <CAHF4apO3Q+KXORN4p+rA=-ZXEUtGQrVrnrm3jsY3f0BgpYamrg@mail.gmail.com>
Subject: Re: L2vpn Digest, Vol 98, Issue 6
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: robert@raszuk.net
Content-Type: multipart/alternative; boundary=047d7b10d02188fc0704c467b652
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 16:00:07 -0000

--047d7b10d02188fc0704c467b652
Content-Type: text/plain; charset=ISO-8859-1

Dear Robert,

Comments inline

On Mon, Jul 9, 2012 at 9:17 PM, Robert Raszuk <robert@raszuk.net> wrote:

> Hi Balaji,
>
>
> > Dear Josh, Robert,
>
>>
>> We had considered the option of IPsec. With respect to encrypting and
>> decrypting at data rates that high we saw issues with respect to
>> computation and power and time as well. While this may be ok for today's
>> network speeds the higher speeds that would be achieved in future would
>> effectively create the above complexity issues if it was done on the PE
>> router (ingress and egress). While the CE based encryption might work,
>> spoofing attacks and other unidirectional attacks may send garbled
>> packets which will be sought to be decrypted thereby DOSing any
>> decryptor. This would be counterproductive.
>>
>
> The ASBR - ASBR local link encryption does not suffer from any of the
> above.


If specific set of VPNs alone are to be subject to the scheme then the ASBR
which encrypts on the local link between ASBR and ASBR will not know which
VPN inner label whose traffic is to be subjected to encryption. Otherwise
it would have to encrypt all traffic since it finds that some of the VPNs
are subject to this scheme. This would be an overkill.


>
>
>  Also the inner label of a Option-C inter-AS MPLS VPN packet cannot be
>> encrypted. If found to belong to a specific VPN that is of interest to
>> the tapper/eavesdropper he can still take the traffic based on that
>> label and decrypt it later on.
>>
>> The proposed scheme in the internet draft makes it difficult to even
>> identify which label belongs to which VPN. Even if identified for a
>> label amongst the set of labels, in order for the tapper to get all the
>> traffic he / she has to guess all the labels, their respective time
>> slices and in addition the innermost label which is digest whose
>> algorithm has to be again guessed. So the proposed scheme provides
>> several lines of defence against spoofing, unidirectional attacks and
>> even eavesdropping.
>>
>
>
> In the same time the proposed scheme makes the troubleshooting impossible.
> How ISPs would decode that for some option C VPNs their customer packets go
> via ASBR to ASBR link or not ?
>

Could you please explain a bit more on this. We assume that all Option-C
traffic has to go through ASBR to ASBR link.


>
> Same for billing. To the best of my knowledge ISPs charge differently for
> the portion of inter-as service. There is need to provide on a per VPN
> stats from ASBR router. How in this scheme per VPN granularity of traffic
> statistics will be accomplished for billing purposes ? That's actually one
> of the key reasons for option B popularity today.
>
>
The billing can be done as follows. Collect the traffic statistics for all
VPN labels as if they were separate VPN labels each for a specific VPN. At
the egress PE collate statistics coming towards it based on a set of labels
instead of a single label in the regular case. Collate this data with the
ASBR statistics (identifying the egress PE by the outer label) and do the
billing.

Hope this helps.

Your inputs would be most useful.

thanks and regards,
balaji venkat


> Thx,
>
> R.
>
>
>
>
>
>
>
>
>> thanks and regards,
>> balaji, shankar and bhargav
>>
>
>
>

--047d7b10d02188fc0704c467b652
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear Robert,<div><br></div><div>Comments inline<br><br><div class=3D"gmail_=
quote">On Mon, Jul 9, 2012 at 9:17 PM, Robert Raszuk <span dir=3D"ltr">&lt;=
<a href=3D"mailto:robert@raszuk.net" target=3D"_blank">robert@raszuk.net</a=
>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi Balaji,<div class=3D"im"><br>
<br>
&gt; Dear Josh, Robert,<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
We had considered the option of IPsec. With respect to encrypting and<br>
decrypting at data rates that high we saw issues with respect to<br>
computation and power and time as well. While this may be ok for today&#39;=
s<br>
network speeds the higher speeds that would be achieved in future would<br>
effectively create the above complexity issues if it was done on the PE<br>
router (ingress and egress). While the CE based encryption might work,<br>
spoofing attacks and other unidirectional attacks may send garbled<br>
packets which will be sought to be decrypted thereby DOSing any<br>
decryptor. This would be counterproductive.<br>
</blockquote>
<br></div>
The ASBR - ASBR local link encryption does not suffer from any of the above=
.</blockquote><div><br></div><div>If specific set of VPNs alone are to be s=
ubject to the scheme then the ASBR which encrypts on the local link between=
 ASBR and ASBR will not know which VPN inner label whose traffic is to be s=
ubjected to encryption. Otherwise it would have to encrypt all traffic sinc=
e it finds that some of the VPNs are subject to this scheme. This would be =
an overkill.</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex"><div class=3D"im"><br>
<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Also the inner label of a Option-C inter-AS MPLS VPN packet cannot be<br>
encrypted. If found to belong to a specific VPN that is of interest to<br>
the tapper/eavesdropper he can still take the traffic based on that<br>
label and decrypt it later on.<br>
<br>
The proposed scheme in the internet draft makes it difficult to even<br>
identify which label belongs to which VPN. Even if identified for a<br>
label amongst the set of labels, in order for the tapper to get all the<br>
traffic he / she has to guess all the labels, their respective time<br>
slices and in addition the innermost label which is digest whose<br>
algorithm has to be again guessed. So the proposed scheme provides<br>
several lines of defence against spoofing, unidirectional attacks and<br>
even eavesdropping.<br>
</blockquote>
<br>
<br></div>
In the same time the proposed scheme makes the troubleshooting impossible. =
How ISPs would decode that for some option C VPNs their customer packets go=
 via ASBR to ASBR link or not ?<br></blockquote><div><br></div><div>Could y=
ou please explain a bit more on this. We assume that all Option-C traffic h=
as to go through ASBR to ASBR link.=A0</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
<br>
Same for billing. To the best of my knowledge ISPs charge differently for t=
he portion of inter-as service. There is need to provide on a per VPN stats=
 from ASBR router. How in this scheme per VPN granularity of traffic statis=
tics will be accomplished for billing purposes ? That&#39;s actually one of=
 the key reasons for option B popularity today.<br>

<br></blockquote><div><br></div><div>The billing can be done as follows. Co=
llect the traffic statistics for all VPN labels as if they were separate VP=
N labels each for a specific VPN. At the egress PE collate statistics comin=
g towards it based on a set of labels instead of a single label in the regu=
lar case. Collate this data with the ASBR statistics (identifying the egres=
s PE by the outer label) and do the billing.=A0</div>
<div><br></div><div>Hope this helps.</div><div><br></div><div>Your inputs w=
ould be most useful.</div><div><br></div><div>thanks and regards,</div><div=
>balaji venkat<br>=A0</div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

Thx,<div class=3D"HOEnZb"><div class=3D"h5"><br>
R.<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
thanks and regards,<br>
balaji, shankar and bhargav<br>
</blockquote>
<br>
<br>
</div></div></blockquote></div><br></div>

--047d7b10d02188fc0704c467b652--

From robert@raszuk.net  Mon Jul  9 09:13:45 2012
Return-Path: <robert@raszuk.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD87621F8618 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:13:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level: 
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iJF9uVOyWo0H for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:13:44 -0700 (PDT)
Received: from mail1310.opentransfer.com (mail1310.opentransfer.com [76.162.254.103]) by ietfa.amsl.com (Postfix) with ESMTP id 9BF5C21F85F7 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 09:13:43 -0700 (PDT)
Received: (qmail 2567 invoked by uid 399); 9 Jul 2012 16:14:08 -0000
Received: from unknown (HELO ?192.168.1.91?) (pbs:robert@raszuk.net@83.31.219.81) by mail1310.opentransfer.com with ESMTPM; 9 Jul 2012 16:14:08 -0000
X-Originating-IP: 83.31.219.81
Message-ID: <4FFB034F.3080302@raszuk.net>
Date: Mon, 09 Jul 2012 18:14:07 +0200
From: Robert Raszuk <robert@raszuk.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Subject: Re: L2vpn Digest, Vol 98, Issue 6
References: <CC1F2A48.5CB9%balajivenkat299@gmail.com> <CC2051BD.9402%josh.rogers@twcable.com> <CAHF4apMcRqSR12o5ckwHRS43b78oTeBn6rna46A1nieJ7ip+bg@mail.gmail.com> <4FFAFD0B.4070102@raszuk.net> <CAHF4apO3Q+KXORN4p+rA=-ZXEUtGQrVrnrm3jsY3f0BgpYamrg@mail.gmail.com>
In-Reply-To: <CAHF4apO3Q+KXORN4p+rA=-ZXEUtGQrVrnrm3jsY3f0BgpYamrg@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: robert@raszuk.net
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 16:13:45 -0000

> If specific set of VPNs alone are to be subject to the scheme

I don't think this is for specific VPNs. It would be applicable for all 
VPNs using option C on a given link between pair of peering ASBRs.

> encryption. Otherwise it would have to encrypt all traffic since it
> finds that some of the VPNs are subject to this scheme. This would be an
> overkill.

I do not think so. If there is any risk that my link is insecure between 
trusted parties it seems wise to make it secure for all control plane 
and data plane traffic which traverses such link.

>     In the same time the proposed scheme makes the troubleshooting
>     impossible. How ISPs would decode that for some option C VPNs their
>     customer packets go via ASBR to ASBR link or not ?
>
> Could you please explain a bit more on this. We assume that all Option-C
> traffic has to go through ASBR to ASBR link.

So do I.

Let's assume customer X reports that he can not ping his remote sites.

Today NOC does:

- Logs into PE and see what VPN label his remote PE peer advertised
- Enabled filter on the ASBR and issues a vrf ping on the PE or CE
- Has ability to see or not his customer packets

With your scheme such filtering becomes impossible. So does the 
troubleshooting.

>     Same for billing. To the best of my knowledge ISPs charge
>     differently for the portion of inter-as service. There is need to
>     provide on a per VPN stats from ASBR router. How in this scheme per
>     VPN granularity of traffic statistics will be accomplished for
>     billing purposes ? That's actually one of the key reasons for option
>     B popularity today.
>
>
> The billing can be done as follows. Collect the traffic statistics for
> all VPN labels as if they were separate VPN labels each for a specific
> VPN. At the egress PE collate statistics coming towards it based on a
> set of labels instead of a single label in the regular case. Collate
> this data with the ASBR statistics (identifying the egress PE by the
> outer label) and do the billing.

If there are many PEs and their labels restart that is a lot of 
additional complexity and data correlation as compared with today.

Many thx,
R.

From balajivenkat299@gmail.com  Mon Jul  9 09:46:18 2012
Return-Path: <balajivenkat299@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6951811E814D for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:46:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.555
X-Spam-Level: 
X-Spam-Status: No, score=-3.555 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jSrE+I7w3Y3y for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 09:46:17 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 206CC11E814C for <l2vpn@ietf.org>; Mon,  9 Jul 2012 09:46:17 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so11311320ghb.31 for <l2vpn@ietf.org>; Mon, 09 Jul 2012 09:46:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=B8M7oY+bR2W3wkt6O1pPYahOJMcUBkGTirJoqcqVS+U=; b=JrRKdBB/zjJ6fZi4JhcSM2jEnkB4/lAFbAJwTUQLV95f1nn/L9o+BV/dhe9B3w2gTP vVffpkmAM2cAqNu9QF1YGsy+TFlYzVpTPkWe32s5VYnIDJK901aPqX1QzPbtbWMv6pSU 8+B8+RfwhdOLWCxxOJ835PVqscp9uB1MEo99YzFfhMop/JmPBLjQCeSete/G3OuTW25t NzVbxDL0RiOothKQ7yVyFh6WJClP47drDnULsma6fZZe7eFCuiRXenrNos7oa1Jo304t YOgeLfH+Cyi9r+zh9GkTUdTYW0CPwS20krbjUn68WKkWgU+o8BwkO+bFNQSD4AcPDN74 t74Q==
MIME-Version: 1.0
Received: by 10.66.77.71 with SMTP id q7mr66970829paw.0.1341852401425; Mon, 09 Jul 2012 09:46:41 -0700 (PDT)
Received: by 10.68.39.228 with HTTP; Mon, 9 Jul 2012 09:46:41 -0700 (PDT)
Date: Mon, 9 Jul 2012 22:16:41 +0530
Message-ID: <CAHF4apPUwuc8B0whmESMhMtdx0gyXHkmUJMqPpVFsDq=eAdVrA@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
To: l2vpn@ietf.org, Robert Raszuk <robert@raszuk.net>
Content-Type: multipart/alternative; boundary=f46d042f9decba5c8004c4685b7f
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 16:46:18 -0000

--f46d042f9decba5c8004c4685b7f
Content-Type: text/plain; charset=ISO-8859-1

Dear Robert,


Message: 4
Date: Mon, 09 Jul 2012 18:14:07 +0200
From: Robert Raszuk <robert@raszuk.net>
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J
        <mjsraman@gmail.com>,   Bhargav Bhikkaji <bharbhi@gmail.com>
Subject: Re: L2vpn Digest, Vol 98, Issue 6
Message-ID: <4FFB034F.3080302@raszuk.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed


> If specific set of VPNs alone are to be subject to the scheme

I don't think this is for specific VPNs. It would be applicable for all
VPNs using option C on a given link between pair of peering ASBRs.

<balajivenkat> This is where the scheme proposed differs. One can select
a specific VPN or set of VPNs carried over Option-C to be subject to this
scheme.
Also it may be possible that Option-A and B are deployed over the same ASBR.
How do we distinguish which is A and B Options and which is C ?
We would find ourselves in a quandry there.

> encryption. Otherwise it would have to encrypt all traffic since it
> finds that some of the VPNs are subject to this scheme. This would be an
> overkill.

I do not think so. If there is any risk that my link is insecure between
trusted parties it seems wise to make it secure for all control plane
and data plane traffic which traverses such link.

<balajivenkat> Worried about the scalability aspects here. Line rates
between
ASBRs are high, how would one cope with so much cycles of encryption and
decryption ?

>     In the same time the proposed scheme makes the troubleshooting
>     impossible. How ISPs would decode that for some option C VPNs their
>     customer packets go via ASBR to ASBR link or not ?
>
> Could you please explain a bit more on this. We assume that all Option-C
> traffic has to go through ASBR to ASBR link.

So do I.

Let's assume customer X reports that he can not ping his remote sites.

Today NOC does:

- Logs into PE and see what VPN label his remote PE peer advertised
- Enabled filter on the ASBR and issues a vrf ping on the PE or CE
- Has ability to see or not his customer packets

With your scheme such filtering becomes impossible. So does the
troubleshooting.

<balajivenkat> One possibility is to actually use a certain fixed label for
vrf ping alone. This can be done without too much complexity. Reachability
can be tested this way.

>     Same for billing. To the best of my knowledge ISPs charge
>     differently for the portion of inter-as service. There is need to
>     provide on a per VPN stats from ASBR router. How in this scheme per
>     VPN granularity of traffic statistics will be accomplished for
>     billing purposes ? That's actually one of the key reasons for option
>     B popularity today.
>
>
> The billing can be done as follows. Collect the traffic statistics for
> all VPN labels as if they were separate VPN labels each for a specific
> VPN. At the egress PE collate statistics coming towards it based on a
> set of labels instead of a single label in the regular case. Collate
> this data with the ASBR statistics (identifying the egress PE by the
> outer label) and do the billing.

If there are many PEs and their labels restart that is a lot of
additional complexity and data correlation as compared with today.

<balajivenkat> This happens for single labels anyways but this is a small
price to pay for more security I guess. Besides we are doing this for select
VPN customers only.

Hope this helps.

thanks and regards,
balaji venkat

Many thx,
R.

--f46d042f9decba5c8004c4685b7f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sa=
ns-serif">Dear Robert,</span></div><div><span style=3D"color:rgb(34,34,34);=
font-size:13px;font-family:arial,sans-serif"><br></span></div><span style=
=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif"><div>
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif"><br></span></div>Message: 4</span><br style=3D"color:rgb(34,34,34);fon=
t-size:13px;font-family:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">Date: Mon, 09 Jul 2012 18:14:07 +0200</span><br style=3D"color:rgb(34,=
34,34);font-size:13px;font-family:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">From: Robert Raszuk &lt;</span><a href=3D"mailto:robert@raszuk.net" st=
yle=3D"color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" ta=
rget=3D"_blank">robert@raszuk.net</a><span style=3D"color:rgb(34,34,34);fon=
t-size:13px;font-family:arial,sans-serif">&gt;</span><br style=3D"color:rgb=
(34,34,34);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">To: Balaji venkat Venkataswami &lt;</span><a href=3D"mailto:balajivenk=
at299@gmail.com" style=3D"color:rgb(17,85,204);font-size:13px;font-family:a=
rial,sans-serif" target=3D"_blank">balajivenkat299@gmail.com</a><span style=
=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">&gt;</=
span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">Cc: &quot;</span><a href=3D"mailto:l2vpn@ietf.org" style=3D"color:rgb(=
17,85,204);font-size:13px;font-family:arial,sans-serif" target=3D"_blank">l=
2vpn@ietf.org</a><span style=3D"color:rgb(34,34,34);font-size:13px;font-fam=
ily:arial,sans-serif">&quot; &lt;</span><a href=3D"mailto:l2vpn@ietf.org" s=
tyle=3D"color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" t=
arget=3D"_blank">l2vpn@ietf.org</a><span style=3D"color:rgb(34,34,34);font-=
size:13px;font-family:arial,sans-serif">&gt;, Shankar Raman M J</span><br s=
tyle=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">=A0 =A0 =A0 =A0 &lt;</span><a href=3D"mailto:mjsraman@gmail.com" style=
=3D"color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" targe=
t=3D"_blank">mjsraman@gmail.com</a><span style=3D"color:rgb(34,34,34);font-=
size:13px;font-family:arial,sans-serif">&gt;, =A0 Bhargav Bhikkaji &lt;</sp=
an><a href=3D"mailto:bharbhi@gmail.com" style=3D"color:rgb(17,85,204);font-=
size:13px;font-family:arial,sans-serif" target=3D"_blank">bharbhi@gmail.com=
</a><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,san=
s-serif">&gt;</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-fa=
mily:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">Subject: Re: L2vpn Digest, Vol 98, Issue 6</span><br style=3D"color:rg=
b(34,34,34);font-size:13px;font-family:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">Message-ID: &lt;</span><a href=3D"mailto:4FFB034F.3080302@raszuk.net" =
style=3D"color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" =
target=3D"_blank">4FFB034F.3080302@raszuk.net</a><span style=3D"color:rgb(3=
4,34,34);font-size:13px;font-family:arial,sans-serif">&gt;</span><br style=
=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed</span>=
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f">

<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,s=
ans-serif">&gt; If specific set of VPNs alone are to be subject to the sche=
me</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,=
sans-serif">

<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">I don&#39;t think this is for specific VPNs. It would be applicable=
 for all</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:=
arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">VPNs using option C on a given link between pair of peering ASBRs.</sp=
an><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif">

<br>&lt;balajivenkat&gt; This is where the scheme proposed differs. One can=
 select<div>a specific VPN or set of VPNs carried over Option-C to be subje=
ct to this scheme.</div><div>Also it may be possible that Option-A and B ar=
e deployed over the same ASBR.</div>
<div>How do we distinguish which is A and B Options and which is C ?</div><=
div>We would find ourselves in a quandry there.</div><div><br><span style=
=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">&gt; e=
ncryption. Otherwise it would have to encrypt all traffic since it</span><b=
r style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif"=
>

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; finds that some of the VPNs are subject to this scheme. This woul=
d be an</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:a=
rial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; overkill.</span><br style=3D"color:rgb(34,34,34);font-size:13px;f=
ont-family:arial,sans-serif">
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">I do not think so. If there is any risk that my link is insecure be=
tween</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:ari=
al,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">trusted parties it seems wise to make it secure for all control plane<=
/span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,san=
s-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">and data plane traffic which traverses such link.</span><br style=3D"c=
olor:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">
<br>&lt;balajivenkat&gt; Worried about the scalability aspects here. Line r=
ates between</div><div>ASBRs are high, how would one cope with so much cycl=
es of encryption and</div><div>decryption ?</div><div><br><span style=3D"co=
lor:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">&gt; =A0 =A0=
 In the same time the proposed scheme makes the troubleshooting</span><br s=
tyle=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 impossible. How ISPs would decode that for some option C =
VPNs their</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-famil=
y:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 customer packets go via ASBR to ASBR link or not ?</span>=
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt;</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family=
:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; Could you please explain a bit more on this. We assume that all O=
ption-C</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:a=
rial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; traffic has to go through ASBR to ASBR link.</span><br style=3D"c=
olor:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">So do I.</span><br style=3D"color:rgb(34,34,34);font-size:13px;font=
-family:arial,sans-serif">

<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">Let&#39;s assume customer X reports that he can not ping his remote=
 sites.</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:a=
rial,sans-serif">

<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">Today NOC does:</span><br style=3D"color:rgb(34,34,34);font-size:13=
px;font-family:arial,sans-serif">

<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">- Logs into PE and see what VPN label his remote PE peer advertised=
</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sa=
ns-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">- Enabled filter on the ASBR and issues a vrf ping on the PE or CE</sp=
an><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">- Has ability to see or not his customer packets</span><br style=3D"co=
lor:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">With your scheme such filtering becomes impossible. So does the</sp=
an><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">troubleshooting.</span><br style=3D"color:rgb(34,34,34);font-size:13px=
;font-family:arial,sans-serif">
<br>&lt;balajivenkat&gt; One possibility is to actually use a certain fixed=
 label for</div><div>vrf ping alone. This can be done without too much comp=
lexity. Reachability</div><div>can be tested this way.<br><br><span style=
=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">&gt; =
=A0 =A0 Same for billing. To the best of my knowledge ISPs charge</span><br=
 style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 differently for the portion of inter-as service. There is=
 need to</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:=
arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 provide on a per VPN stats from ASBR router. How in this =
scheme per</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-famil=
y:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 VPN granularity of traffic statistics will be accomplishe=
d for</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:ari=
al,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 billing purposes ? That&#39;s actually one of the key rea=
sons for option</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-=
family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; =A0 =A0 B popularity today.</span><br style=3D"color:rgb(34,34,34=
);font-size:13px;font-family:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt;</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family=
:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt;</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family=
:arial,sans-serif">
<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; The billing can be done as follows. Collect the traffic statistic=
s for</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:ari=
al,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; all VPN labels as if they were separate VPN labels each for a spe=
cific</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:ari=
al,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; VPN. At the egress PE collate statistics coming towards it based =
on a</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:aria=
l,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; set of labels instead of a single label in the regular case. Coll=
ate</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial=
,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; this data with the ASBR statistics (identifying the egress PE by =
the</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial=
,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">&gt; outer label) and do the billing.</span><br style=3D"color:rgb(34,=
34,34);font-size:13px;font-family:arial,sans-serif">
<br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-seri=
f"><span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans=
-serif">If there are many PEs and their labels restart that is a lot of</sp=
an><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">additional complexity and data correlation as compared with today.</sp=
an><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-s=
erif">

<br>&lt;balajivenkat&gt; This happens for single labels anyways but this is=
 a small</div><div>price to pay for more security I guess. Besides we are d=
oing this for select</div><div>VPN customers only.</div><div><br></div>
<div>Hope this helps.</div><div><br></div><div>thanks and regards,</div><di=
v>balaji venkat<br><br><span style=3D"color:rgb(34,34,34);font-size:13px;fo=
nt-family:arial,sans-serif">Many thx,</span><br style=3D"color:rgb(34,34,34=
);font-size:13px;font-family:arial,sans-serif">

<span style=3D"color:rgb(34,34,34);font-size:13px;font-family:arial,sans-se=
rif">R.</span><br style=3D"color:rgb(34,34,34);font-size:13px;font-family:a=
rial,sans-serif">

</div>

--f46d042f9decba5c8004c4685b7f--

From gregimirsky@gmail.com  Mon Jul  9 10:45:12 2012
Return-Path: <gregimirsky@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 128DB11E81B4; Mon,  9 Jul 2012 10:45:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0YfAMaQ4eOgF; Mon,  9 Jul 2012 10:45:11 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id D349811E81AB; Mon,  9 Jul 2012 10:45:10 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so11383974ghb.31 for <multiple recipients>; Mon, 09 Jul 2012 10:45:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=SiSsbeTZdOPf05Nj2YDoB454DqsvArNVa1fwIUBXdKU=; b=G7rgmMDM/NF04EApbm5ejEpd5ag1zF3Q/VJLF22sG1Vux/Nfw61oCI6U6Pf/C8/ypN h2JyMYp4LMgxFLOP75q+m4pZniEMhHnqvvCrPt78p6wDNJEWHThHAWB7bUfZ5n5GLvYy PECdWOWbdi4CnO+U5jIPZWIuh9K9sDA7hmC3+GrS0TyYKoLlLtS2XWDoy6exMCWb0TU2 LQdky7w40TjNOcUqpQuqV8OeoQZuYVer0zYBv3c6HuDXI3c1g2MXZapV4LfmNhTzFmSF 7cWriig2QK91YdyEDx4IyIhP12buv6aIHNqE03vs4GJdWuOajis9qlA6FIMTEJx4xyPm NMrw==
MIME-Version: 1.0
Received: by 10.236.186.101 with SMTP id v65mr29269456yhm.23.1341855936064; Mon, 09 Jul 2012 10:45:36 -0700 (PDT)
Received: by 10.100.89.5 with HTTP; Mon, 9 Jul 2012 10:45:35 -0700 (PDT)
In-Reply-To: <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com>
Date: Mon, 9 Jul 2012 10:45:35 -0700
Message-ID: <CA+RyBmXZLq5S_y2TqisNpEZ0EEMMaQ11XuR0=houqS-C=paxmA@mail.gmail.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
From: Greg Mirsky <gregimirsky@gmail.com>
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Content-Type: multipart/alternative; boundary=20cf3054a0af68abeb04c4692e80
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "robert@raszuk.net" <robert@raszuk.net>, "tictoc@ietf.org" <tictoc@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 17:45:12 -0000

--20cf3054a0af68abeb04c4692e80
Content-Type: text/plain; charset=ISO-8859-1

Dear Balaji,
you've said " There is no information except on the ingress and egress PEs
that identifies which is the PTP LSP for a particular VPN traffic protected
by this scheme."
AFAIK, notion of PTP LSP is not limited to PE's but to all P's that get PTP
updates. Would that compromise your method?

Regards,
Greg

On Mon, Jul 9, 2012 at 8:47 AM, Balaji venkat Venkataswami <
balajivenkat299@gmail.com> wrote:

> Dear Tal,
>
> Comments inline
>
> On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com> wrote:
>
>> Hi Balaji,
>>
>> A few clarification questions - I think it would be good to clarify these
>> issues in the draft:
>> 1.      Since the label hopping mechanism relies on PTP, I understand
>> that PTP traffic itself does not use label hopping, right?
>>
>
> The PTP traffic itself does not use label hopping.
>
>
>> 2.      Is there something preventing the attacker from attacking PTP,
>> thus causing DoS to the data plane?
>>
>
> It would be difficult for the attacker to identify which LSP is the PTP
> LSP for a specific VPN traffic (flow / set of flows) that is protected by
> this scheme. There is no information except on the ingress and egress PEs
> that identifies which is the PTP LSP for a particular VPN traffic protected
> by this scheme.
>
> 3.      Is the "additional label" similar to an Integrity Check Value
>> (ICV) computed over part of the packet header?
>>
>
> It serves as a digest from which certain specific bits are chosen to
> become the innermost label. Which bits are chosen depends upon the bitmask
> exchanged during the control plane.
>
>
>> 4.      Is there something in your approach that would prevent an
>> attacker from a replay attack?
>>
>
> For a reply attack to succeed, the replay should time the labels correctly
> otherwise the traffic gets rejected.
>
> 5.      Looking at "Algorithm 3" I was not sure: does the receiver check
>> two consequent time slots? I could not see such a check. I am referring to
>> a case where the sender transmits at the end of a time slot, and the packet
>> is received at the beginning of the next time slot. That would mean the
>> receiver has to be able to tolerate two concurrent time slots, right?
>>
>
> Yes. It is available as +or- 1 unit (usually seconds) in the algorithm.
> Maybe a little more fine tuning is required on this.
>
>
>> 6.      The security parameters K, TS, A, I are exchanged over a secure
>> link, which basically assumes there is a pre-shared key between the peer
>> PEs. A naive question would be: how is your approach better than just using
>> a standard ICV, based on the existing pre-shared key?
>>
>
> While the ICV may protect against modification of the inner payload one
> cannot prevent spoofing attacks if the algorithm for the ICV is deduced.
> Our scheme provides facility to change the labels from time slice to time
> slice so that guessing what packet belongs to which VPN traffic itself
> becomes difficult. This is the first line of defense. If we provide ICV
> alone we protect against modification but not with replay attacks. The
> proposed scheme protects against VPN traffic identification (so replay
> attacks cannot be made) and modification as well through the ICV which is
> the innermost label.
>
> thanks and regards,
> balaji , shankar and bhargav
>
>>
>> Tal.
>>
>>
>

--20cf3054a0af68abeb04c4692e80
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Dear Balaji,<br>you&#39;ve said &quot; There is no information except on th=
e ingress and egress PEs that=20
identifies which is the PTP LSP for a particular VPN traffic protected=20
by this scheme.&quot;<br>AFAIK, notion of PTP LSP is not limited to PE&#39;=
s but to all P&#39;s that get PTP updates. Would that compromise your metho=
d?<br><br>Regards,<br>Greg<br><br><div class=3D"gmail_quote">On Mon, Jul 9,=
 2012 at 8:47 AM, Balaji venkat Venkataswami <span dir=3D"ltr">&lt;<a href=
=3D"mailto:balajivenkat299@gmail.com" target=3D"_blank">balajivenkat299@gma=
il.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Dear Tal,<div><br></div><div>Comments inline=
<br><br><div class=3D"gmail_quote"><div class=3D"im">On Mon, Jul 9, 2012 at=
 11:44 AM, Tal Mizrahi <span dir=3D"ltr">&lt;<a href=3D"mailto:talmi@marvel=
l.com" target=3D"_blank">talmi@marvell.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi Balaji,<br>
<br>
A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:<br>
1. =A0 =A0 =A0Since the label hopping mechanism relies on PTP, I understand=
 that PTP traffic itself does not use label hopping, right?<br></blockquote=
><div><br></div></div><div>The PTP traffic itself does not use label hoppin=
g.</div>
<div class=3D"im">
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
2. =A0 =A0 =A0Is there something preventing the attacker from attacking PTP=
, thus causing DoS to the data plane?<br></blockquote><div><br></div></div>=
<div>It would be difficult for the attacker to identify which LSP is the PT=
P LSP for a specific VPN traffic (flow / set of flows) that is protected by=
 this scheme. There is no information except on the ingress and egress PEs =
that identifies which is the PTP LSP for a particular VPN traffic protected=
 by this scheme.=A0</div>
<div class=3D"im">
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
3. =A0 =A0 =A0Is the &quot;additional label&quot; similar to an Integrity C=
heck Value (ICV) computed over part of the packet header?<br></blockquote><=
div><br></div></div><div>It serves as a digest from which certain specific =
bits are chosen to become the innermost label. Which bits are chosen depend=
s upon the bitmask exchanged during the control plane.</div>
<div class=3D"im">
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
4. =A0 =A0 =A0Is there something in your approach that would prevent an att=
acker from a replay attack?<br></blockquote><div><br></div></div><div>For a=
 reply attack to succeed, the replay should time the labels correctly other=
wise the traffic gets rejected.</div>
<div class=3D"im">
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
5. =A0 =A0 =A0Looking at &quot;Algorithm 3&quot; I was not sure: does the r=
eceiver check two consequent time slots? I could not see such a check. I am=
 referring to a case where the sender transmits at the end of a time slot, =
and the packet is received at the beginning of the next time slot. That wou=
ld mean the receiver has to be able to tolerate two concurrent time slots, =
right?<br>

</blockquote><div><br></div></div><div>Yes. It is available as +or- 1 unit =
(usually seconds) in the algorithm. Maybe a little more fine tuning is requ=
ired on this.</div><div class=3D"im"><div>=A0</div><blockquote class=3D"gma=
il_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef=
t:1ex">


6. =A0 =A0 =A0The security parameters K, TS, A, I are exchanged over a secu=
re link, which basically assumes there is a pre-shared key between the peer=
 PEs. A naive question would be: how is your approach better than just usin=
g a standard ICV, based on the existing pre-shared key?<br>

</blockquote><div><br></div></div><div>While the ICV may protect against mo=
dification of the inner payload one cannot prevent spoofing attacks if the =
algorithm for the ICV is deduced. Our scheme provides facility to change th=
e labels from time slice to time slice so that guessing what packet belongs=
 to which VPN traffic itself becomes difficult. This is the first line of d=
efense. If we provide ICV alone we protect against modification but not wit=
h replay attacks. The proposed scheme protects against VPN traffic identifi=
cation (so replay attacks cannot be made) and modification as well through =
the ICV which is the innermost label.</div>

<div><br></div><div>thanks and regards,</div><div>balaji , shankar and bhar=
gav</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex">
<span><font color=3D"#888888"><br>
Tal.<br>
<br>
</font></span></blockquote></div><br></div>
</blockquote></div><br>

--20cf3054a0af68abeb04c4692e80--

From ju1738@att.com  Mon Jul  9 10:56:46 2012
Return-Path: <ju1738@att.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6F1D11E81A9 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 10:56:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.319
X-Spam-Level: 
X-Spam-Status: No, score=-106.319 tagged_above=-999 required=5 tests=[AWL=0.280, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TBlcCJjXf3H2 for <l2vpn@ietfa.amsl.com>; Mon,  9 Jul 2012 10:56:45 -0700 (PDT)
Received: from nbfkord-smmo07.seg.att.com (nbfkord-smmo07.seg.att.com [209.65.160.93]) by ietfa.amsl.com (Postfix) with ESMTP id 33EA011E8162 for <l2vpn@ietf.org>; Mon,  9 Jul 2012 10:56:45 -0700 (PDT)
Received: from unknown [144.160.20.145] (EHLO nbfkord-smmo07.seg.att.com) by nbfkord-smmo07.seg.att.com(mxl_mta-6.11.0-10) with ESMTP id 67b1bff4.2aaafbe52940.1227980.00-510.3293136.nbfkord-smmo07.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 17:57:10 +0000 (UTC)
X-MXL-Hash: 4ffb1b760ac9215d-58eb564dffee94f209dd2eb694252bfca908b83e
Received: from unknown [144.160.20.145] (EHLO mlpd192.enaf.sfdc.sbc.com) by nbfkord-smmo07.seg.att.com(mxl_mta-6.11.0-10) over TLS secured channel with ESMTP id 27b1bff4.0.1227961.00-399.3293076.nbfkord-smmo07.seg.att.com (envelope-from <ju1738@att.com>);  Mon, 09 Jul 2012 17:57:07 +0000 (UTC)
X-MXL-Hash: 4ffb1b731a65550f-933fbefef1bac8114181e5e8cc54ccdc5394e9ef
Received: from enaf.sfdc.sbc.com (localhost.localdomain [127.0.0.1]) by mlpd192.enaf.sfdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69Hv6VD009713; Mon, 9 Jul 2012 13:57:06 -0400
Received: from sflint01.pst.cso.att.com (sflint01.pst.cso.att.com [144.154.234.228]) by mlpd192.enaf.sfdc.sbc.com (8.14.5/8.14.5) with ESMTP id q69Hv3a0009698 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 9 Jul 2012 13:57:03 -0400
Received: from MISOUT7MSGHUB9D.ITServices.sbc.com (misout7msghub9d.itservices.sbc.com [144.151.223.93]) by sflint01.pst.cso.att.com (RSA Interceptor); Mon, 9 Jul 2012 13:56:52 -0400
Received: from MISOUT7MSGUSR9I.ITServices.sbc.com ([144.151.223.56]) by MISOUT7MSGHUB9D.ITServices.sbc.com ([144.151.223.93]) with mapi id 14.02.0298.004; Mon, 9 Jul 2012 13:56:51 -0400
From: "UTTARO, JAMES" <ju1738@att.com>
To: "'Rogers, Josh'" <josh.rogers@twcable.com>, balaji venkat Venkataswami <balajivenkat299@gmail.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Subject: RE: L2vpn Digest, Vol 98, Issue 6
Thread-Topic: L2vpn Digest, Vol 98, Issue 6
Thread-Index: Ac1d3iOdVst3wH8vN0uvsrGUCI9bogAAKKdgAAjeloAAAYQN8A==
Date: Mon, 9 Jul 2012 17:56:51 +0000
Message-ID: <B17A6910EEDD1F45980687268941550FB32B38@MISOUT7MSGUSR9I.ITServices.sbc.com>
References: <B17A6910EEDD1F45980687268941550FB32995@MISOUT7MSGUSR9I.ITServices.sbc.com> <CC2056D0.9463%josh.rogers@twcable.com>
In-Reply-To: <CC2056D0.9463%josh.rogers@twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.155.252]
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2010122901)]
X-MAIL-FROM: <ju1738@att.com>
X-SOURCE-IP: [144.160.20.145]
X-AnalysisOut: [v=1.0 c=1 a=gE9O8Arr410A:10 a=9xHMEmg6Re4A:10 a=ofMgfj31e3]
X-AnalysisOut: [cA:10 a=BLceEmwcHowA:10 a=-CRmgG0JhlAA:10 a=ZRNLZ4dFUbCvG8]
X-AnalysisOut: [UMqPvVAA==:17 a=ahv8dbORAAAA:8 a=48vgC7mUAAAA:8 a=2clOPd4P]
X-AnalysisOut: [AAAA:8 a=zQP7CpKOAAAA:8 a=pGLkceISAAAA:8 a=bu-4PJRAI4fuBXv]
X-AnalysisOut: [7cYIA:9 a=jiObf9B0YAUA:10 a=BDsChg1p1CEA:10 a=lZB815dzVvQA]
X-AnalysisOut: [:10 a=bDUki_mJ7DgA:10 a=Hz7IrDYlS0cA:10 a=MSl-tDqOz04A:10 ]
X-AnalysisOut: [a=UIcTdWks-MRqePm4:21 a=UXk42QkqMWjFuIZr:21]
Cc: Shankar Raman M J <mjsraman@gmail.com>, Bhargav Bhikkaji <bharbhi@gmail.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 17:56:47 -0000

+1

-----Original Message-----
From: Rogers, Josh [mailto:josh.rogers@twcable.com]=20
Sent: Monday, July 09, 2012 10:40 AM
To: UTTARO, JAMES; balaji venkat Venkataswami; l2vpn@ietf.org; robert@raszu=
k.net
Cc: Shankar Raman M J; Bhargav Bhikkaji
Subject: Re: L2vpn Digest, Vol 98, Issue 6

I would propose tabling this draft, and attempting to create a document
outlining 1) how best to establish option C peering with other SP's, and
2) outstanding caveats/exposures that are not addressed with available
technology/standards.

Having such a document would better frame any subsequent 'solution' drafts
that address concerns not currently addressable with good policy/practice.

-josh


On 7/9/12 9:35 AM, "UTTARO, JAMES" <ju1738@att.com> wrote:

>Josh,
>
>       Yes quite leery of building an Option C solution to other providers=
 for
>a number of reasons including trust, security but also others i.e RT
>Mapping, Scale, Protected Infrastructure available to others, IGP Scale (
># of LBs ), Pri/Back Selection of ASBR, attack on the PEs, etc...
>Actually the more sophisticated the Option C solution the more alignment
>and possible risk.
>
>I understand the ask that this draft is attempting to meet, but does it
>make sense to do this without addressing the other facets of building an
>Option C solution between different ISPs..
>
>Jim Uttaro
>
>
>
>
>-----Original Message-----
>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of
>Rogers, Josh
>Sent: Monday, July 09, 2012 10:22 AM
>To: balaji venkat Venkataswami; l2vpn@ietf.org; robert@raszuk.net
>Cc: Shankar Raman M J; Bhargav Bhikkaji
>Subject: Re: L2vpn Digest, Vol 98, Issue 6
>
>While I don't necessarily agree with this draft's approach ("security
>through obscurity" comes to mind), I'd like to point out that I do see a
>need to assuage concerns about using Option C between operators.  In my
>part of the world, when I propose Option C to other operators, often the
>idea is met with concern/resistance, seemingly because the other operator
>has not done it before.  Even internally, many of my colleagues are
>concerned about security and the trust model in general.  It appears to
>me, to be no different than any other IP peering relationship, which
>requires some basic 'trust', albeit not implicit trust.
>
>I think Robert's suggestion of leveraging encryption is a more ironclad
>and reasonable solution to the problems presented here.  However, I'd
>still like to see an informative 'best practices' document at some point
>that covered some basic policies that should be followed when peering with
>another ISP for LxVPN exchange.
>
>-Josh
>
>
>
>On 7/8/12 1:46 AM, "balaji venkat Venkataswami"
><balajivenkat299@gmail.com> wrote:
>
>>Dear Robert,
>>
>>As mentioned in the earlier mail the following restriction is imposed on
>>the
>>Model C deployment=A9
>>
>>The consequence of this is that in model C the service providers must
>>trust each other also in areas that are not shared. Therefore, model C is
>>most commonly used today where a single operator uses several ASs on the
>>backbone. In this case, implicit trust exists between the ASs because
>>they
>>have the same operational control.
>>
>>
>>In order to stretch this scheme to other Ases under different admin
>>control this scheme helps out.
>>
>>Thanks and regards,
>>Balaji venkat
>>
>>On 08/07/12 12:30 AM, "l2vpn-request@ietf.org" <l2vpn-request@ietf.org>
>>wrote:
>>
>>>If you have received this digest without all the individual message
>>>attachments you will need to update your digest options in your list
>>>subscription.  To do so, go to
>>>
>>>https://www.ietf.org/mailman/listinfo/l2vpn
>>>
>>>Click the 'Unsubscribe or edit options' button, log in, and set "Get
>>>MIME or Plain Text Digests?" to MIME.  You can set this option
>>>globally for all the list digests you receive at this point.
>>>
>>>
>>>
>>>Send L2vpn mailing list submissions to
>>>      l2vpn@ietf.org
>>>
>>>To subscribe or unsubscribe via the World Wide Web, visit
>>>      https://www.ietf.org/mailman/listinfo/l2vpn
>>>or, via email, send a message with subject or body 'help' to
>>>      l2vpn-request@ietf.org
>>>
>>>You can reach the person managing the list at
>>>      l2vpn-owner@ietf.org
>>>
>>>When replying, please edit your Subject line so it is more specific
>>>than "Re: Contents of L2vpn digest..."
>>>
>>>
>>>Today's Topics:
>>>
>>>   1. draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>>      (Robert Raszuk)
>>>
>>>
>>>----------------------------------------------------------------------
>>>
>>>Message: 1
>>>Date: Sat, 07 Jul 2012 14:39:56 +0200
>>>From: Robert Raszuk <robert@raszuk.net>
>>>To: "l2vpn@ietf.org" <l2vpn@ietf.org>
>>>Subject: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
>>>Message-ID: <4FF82E1C.6000009@raszuk.net>
>>>Content-Type: text/plain; charset=3DISO-8859-1; format=3Dflowed
>>>
>>>
>>>I have read the draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt.
>>>
>>>It proposed an interesting solution to apply algorithmically computed
>>>VPN lable (for L2VPNs, but also possible for L3VPN) where inter-as
>>>option C is used.
>>>
>>>However I have a fundamental question .. from who the draft is
>>>protecting the inter-as service ?
>>>
>>>Who other then participating ISPs can spoof a value of VPN label ? If
>>>the solution is protecting from ISPs itself then I think it does not
>>>help at all as corresponding ISPs/SPs still have full access to their
>>>PEs and could inject packets to VPN sites at will.
>>>
>>>Moreover main issue with option C is not security (at least for the last
>>>10+ years). Main issue with option C and MPLS is that participating
>>>providers need to inject into each other's network all of their
>>>participating PE's /32 addresses so the end to end MPLS LSP can be
>>>build. Originally that was recommended to be done by mutual
>>>redistribution to the IGP .. now the general recommendation is to use
>>>labeled BGP (both IBGP and EBGP).
>>>
>>>So fundamental question to the authors ... who is the potential
>>>attacker/spoofer this draft is aiming to protect from ?
>>>
>>>Best regards,
>>>R.
>>>
>>>
>>>
>>>
>>>
>>>------------------------------
>>>
>>>_______________________________________________
>>>L2vpn mailing list
>>>L2vpn@ietf.org
>>>https://www.ietf.org/mailman/listinfo/l2vpn
>>>
>>>
>>>End of L2vpn Digest, Vol 98, Issue 6
>>>************************************
>>
>>
>
>
>This E-mail and any of its attachments may contain Time Warner Cable
>proprietary information, which is privileged, confidential, or subject to
>copyright belonging to Time Warner Cable. This E-mail is intended solely
>for the use of the individual or entity to which it is addressed. If you
>are not the intended recipient of this E-mail, you are hereby notified
>that any dissemination, distribution, copying, or action taken in
>relation to the contents of and attachments to this E-mail is strictly
>prohibited and may be unlawful. If you have received this E-mail in
>error, please notify the sender immediately and permanently delete the
>original and any copy of this E-mail and any printout.


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From talmi@marvell.com  Mon Jul  9 12:06:21 2012
Return-Path: <talmi@marvell.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 005D811E8165; Mon,  9 Jul 2012 12:06:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6coVAEMcIlL4; Mon,  9 Jul 2012 12:06:18 -0700 (PDT)
Received: from galiil.marvell.com (galiil.marvell.com [199.203.130.254]) by ietfa.amsl.com (Postfix) with ESMTP id E289011E814F; Mon,  9 Jul 2012 12:06:10 -0700 (PDT)
From: Tal Mizrahi <talmi@marvell.com>
To: Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 9 Jul 2012 22:06:29 +0300
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1d6hqW9ssineDjRymcI0+sUBeL5QAGlYJg
Message-ID: <74470498B659FA4687F0B0018C19A89C01A0F8743E91@IL-MB01.marvell.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com>
In-Reply-To: <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_74470498B659FA4687F0B0018C19A89C01A0F8743E91ILMB01marve_"
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 19:06:21 -0000

--_000_74470498B659FA4687F0B0018C19A89C01A0F8743E91ILMB01marve_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Balaji,

Thanks for the prompt and detailed response.
Please see inline.

Regards,
Tal.

From: Balaji venkat Venkataswami [mailto:balajivenkat299@gmail.com]
Sent: Monday, July 09, 2012 6:47 PM
To: Tal Mizrahi
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Tal,

Comments inline
On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com<mailto:talm=
i@marvell.com>> wrote:
Hi Balaji,

A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:
1.      Since the label hopping mechanism relies on PTP, I understand that =
PTP traffic itself does not use label hopping, right?

The PTP traffic itself does not use label hopping.

2.      Is there something preventing the attacker from attacking PTP, thus=
 causing DoS to the data plane?

It would be difficult for the attacker to identify which LSP is the PTP LSP=
 for a specific VPN traffic (flow / set of flows) that is protected by this=
 scheme. There is no information except on the ingress and egress PEs that =
identifies which is the PTP LSP for a particular VPN traffic protected by t=
his scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV)=
 computed over part of the packet header?

It serves as a digest from which certain specific bits are chosen to become=
 the innermost label. Which bits are chosen depends upon the bitmask exchan=
ged during the control plane.
[TM] Right. Unless I am missing something, that sounds like a variant of an=
 ICV: it basically produces a label which is a function(packet payload, pre=
-shared secret). That is essentially what an ICV does, unless I am missing =
something?

4.      Is there something in your approach that would prevent an attacker =
from a replay attack?

For a reply attack to succeed, the replay should time the labels correctly =
otherwise the traffic gets rejected.
[TM] Right, so assuming the attacker is "fast enough", the attacker can rep=
lay during the time slice (which is ~seconds)?

5.      Looking at "Algorithm 3" I was not sure: does the receiver check tw=
o consequent time slots? I could not see such a check. I am referring to a =
case where the sender transmits at the end of a time slot, and the packet i=
s received at the beginning of the next time slot. That would mean the rece=
iver has to be able to tolerate two concurrent time slots, right?

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm. May=
be a little more fine tuning is required on this.

6.      The security parameters K, TS, A, I are exchanged over a secure lin=
k, which basically assumes there is a pre-shared key between the peer PEs. =
A naive question would be: how is your approach better than just using a st=
andard ICV, based on the existing pre-shared key?

While the ICV may protect against modification of the inner payload one can=
not prevent spoofing attacks if the algorithm for the ICV is deduced. Our s=
cheme provides facility to change the labels from time slice to time slice =
so that guessing what packet belongs to which VPN traffic itself becomes di=
fficult. This is the first line of defense. If we provide ICV alone we prot=
ect against modification but not with replay attacks. The proposed scheme p=
rotects against VPN traffic identification (so replay attacks cannot be mad=
e) and modification as well through the ICV which is the innermost label.
[TM] Since an ICV uses a pre-shared key, even if the algorithm is well-know=
n to the attacker, the attacker cannot forge/spoof it, assuming that the at=
tacker is not exposed to the key. ICV mechanisms typically support anti rep=
lay, e.g., the IPsec AH.

thanks and regards,
balaji , shankar and bhargav

Tal.


--_000_74470498B659FA4687F0B0018C19A89C01A0F8743E91ILMB01marve_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40"><head><meta http-equiv=3DContent-Type content=3D"text/html; charset=3Du=
s-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 (filtered medi=
um)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Hi Balaji=
,<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span>=
</p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calib=
ri","sans-serif";color:#1F497D'>Thanks for the prompt and detailed response=
.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'>Please see inline.<o:p><=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>Regards,<o:p></o:p></span></p><p class=3DMsoNormal=
><span style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F=
497D'>Tal.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:=
p></span></p><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-f=
amily:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:10.0p=
t;font-family:"Tahoma","sans-serif"'> Balaji venkat Venkataswami [mailto:ba=
lajivenkat299@gmail.com] <br><b>Sent:</b> Monday, July 09, 2012 6:47 PM<br>=
<b>To:</b> Tal Mizrahi<br><b>Cc:</b> l2vpn@ietf.org; Shankar Raman M J; tic=
toc@ietf.org; robert@raszuk.net<br><b>Subject:</b> Re: draft-mjsraman-l2vpn=
-vpls-tictoc-label-hop-00.txt ...<o:p></o:p></span></p><p class=3DMsoNormal=
><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Dear Tal,<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal styl=
e=3D'margin-bottom:12.0pt'>Comments inline<o:p></o:p></p><div><p class=3DMs=
oNormal>On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi &lt;<a href=3D"mailto:=
talmi@marvell.com" target=3D"_blank">talmi@marvell.com</a>&gt; wrote:<o:p><=
/o:p></p><p class=3DMsoNormal>Hi Balaji,<br><br>A few clarification questio=
ns - I think it would be good to clarify these issues in the draft:<br>1. &=
nbsp; &nbsp; &nbsp;Since the label hopping mechanism relies on PTP, I under=
stand that PTP traffic itself does not use label hopping, right?<o:p></o:p>=
</p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMs=
oNormal>The PTP traffic itself does not use label hopping.<o:p></o:p></p></=
div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote style=
=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;m=
argin-left:4.8pt;margin-right:0in'><p class=3DMsoNormal>2. &nbsp; &nbsp; &n=
bsp;Is there something preventing the attacker from attacking PTP, thus cau=
sing DoS to the data plane?<o:p></o:p></p></blockquote><div><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>It would be diff=
icult for the attacker to identify which LSP is the PTP LSP for a specific =
VPN traffic (flow / set of flows) that is protected by this scheme. There i=
s no information except on the ingress and egress PEs that identifies which=
 is the PTP LSP for a particular VPN traffic protected by this scheme.&nbsp=
;<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div>=
<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><p class=3DMsoNormal>3.=
 &nbsp; &nbsp; &nbsp;Is the &quot;additional label&quot; similar to an Inte=
grity Check Value (ICV) computed over part of the packet header?<o:p></o:p>=
</p></blockquote><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div>=
<p class=3DMsoNormal>It serves as a digest from which certain specific bits=
 are chosen to become the innermost label. Which bits are chosen depends up=
on the bitmask exchanged during the control plane.<o:p></o:p></p><p class=
=3DMsoNormal><b><i><span style=3D'font-size:11.0pt;font-family:"Calibri","s=
ans-serif";color:#1F497D'>[TM] Right. Unless I am missing something, that s=
ounds like a variant of an ICV: it basically produces a label which is a fu=
nction(packet payload, pre-shared secret). That is essentially what an ICV =
does, unless I am missing something?</span></i></b><span style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p></o:p></span=
></p></div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote=
 style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6=
.0pt;margin-left:4.8pt;margin-right:0in'><p class=3DMsoNormal>4. &nbsp; &nb=
sp; &nbsp;Is there something in your approach that would prevent an attacke=
r from a replay attack?<o:p></o:p></p></blockquote><div><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>For a reply attack t=
o succeed, the replay should time the labels correctly otherwise the traffi=
c gets rejected.<o:p></o:p></p><p class=3DMsoNormal><b><i><span style=3D'fo=
nt-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>[TM] Right=
, so assuming the attacker is &#8220;fast enough&#8221;, the attacker can r=
eplay during the time slice (which is ~seconds)?</span></i></b><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p=
></o:p></span></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></di=
v><blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:=
0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><p class=3DMsoNormal>=
5. &nbsp; &nbsp; &nbsp;Looking at &quot;Algorithm 3&quot; I was not sure: d=
oes the receiver check two consequent time slots? I could not see such a ch=
eck. I am referring to a case where the sender transmits at the end of a ti=
me slot, and the packet is received at the beginning of the next time slot.=
 That would mean the receiver has to be able to tolerate two concurrent tim=
e slots, right?<o:p></o:p></p></blockquote><div><p class=3DMsoNormal><o:p>&=
nbsp;</o:p></p></div><div><p class=3DMsoNormal>Yes. It is available as +or-=
 1 unit (usually seconds) in the algorithm. Maybe a little more fine tuning=
 is required on this.<o:p></o:p></p></div><div><p class=3DMsoNormal>&nbsp;<=
o:p></o:p></p></div><blockquote style=3D'border:none;border-left:solid #CCC=
CCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><p =
class=3DMsoNormal>6. &nbsp; &nbsp; &nbsp;The security parameters K, TS, A, =
I are exchanged over a secure link, which basically assumes there is a pre-=
shared key between the peer PEs. A naive question would be: how is your app=
roach better than just using a standard ICV, based on the existing pre-shar=
ed key?<o:p></o:p></p></blockquote><div><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p></div><div><p class=3DMsoNormal>While the ICV may protect against mo=
dification of the inner payload one cannot prevent spoofing attacks if the =
algorithm for the ICV is deduced. Our scheme provides facility to change th=
e labels from time slice to time slice so that guessing what packet belongs=
 to which VPN traffic itself becomes difficult. This is the first line of d=
efense. If we provide ICV alone we protect against modification but not wit=
h replay attacks. The proposed scheme protects against VPN traffic identifi=
cation (so replay attacks cannot be made) and modification as well through =
the ICV which is the innermost label.<o:p></o:p></p><p class=3DMsoNormal><b=
><i><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'>[TM] Since an ICV uses a pre-shared key, even if the algorithm i=
s well-known to the attacker, the attacker cannot forge/spoof it, assuming =
that the attacker is not exposed to the key. ICV mechanisms typically suppo=
rt anti replay, e.g., the IPsec AH.</span></i></b><span style=3D'font-size:=
11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p></o:p></span>=
</p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p clas=
s=3DMsoNormal>thanks and regards,<o:p></o:p></p></div><div><p class=3DMsoNo=
rmal>balaji , shankar and bhargav<o:p></o:p></p></div><blockquote style=3D'=
border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margi=
n-left:4.8pt;margin-right:0in'><p class=3DMsoNormal style=3D'margin-bottom:=
12.0pt'><span style=3D'color:#888888'><br><span class=3Dhoenzb>Tal.</span><=
/span><o:p></o:p></p></blockquote></div><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p></div></div></body></html>=

--_000_74470498B659FA4687F0B0018C19A89C01A0F8743E91ILMB01marve_--

From bhargav@force10networks.com  Mon Jul  9 15:44:42 2012
Return-Path: <bhargav@force10networks.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82C3721F85F3; Mon,  9 Jul 2012 15:44:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.091
X-Spam-Level: *
X-Spam-Status: No, score=1.091 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_COM=0.553, HOST_EQ_STATIC=1.172, HOST_MISMATCH_NET=0.311, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qd5vFLrf3+Et; Mon,  9 Jul 2012 15:44:41 -0700 (PDT)
Received: from mx.force10networks.com (207.47.62.31.static.nextweb.net [207.47.62.31]) by ietfa.amsl.com (Postfix) with ESMTP id 976FC21F85F2; Mon,  9 Jul 2012 15:44:41 -0700 (PDT)
Received: from EX07-SJC-MBX1.force10networks.com ([fe80:0000:0000:0000:30d7:5b59:107.47.36.196]) by exch7-sjc-fe.force10networks.com ([10.11.0.87]) with mapi; Mon, 9 Jul 2012 15:45:07 -0700
From: Bhargav Bhikkaji <bhargav@force10networks.com>
To: Greg Mirsky <gregimirsky@gmail.com>, Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 9 Jul 2012 15:45:04 -0700
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1d+re2OFQ5p2bbRUasmakqZL+VkwAKPAjw
Message-ID: <EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com> <CA+RyBmXZLq5S_y2TqisNpEZ0EEMMaQ11XuR0=houqS-C=paxmA@mail.gmail.com>
In-Reply-To: <CA+RyBmXZLq5S_y2TqisNpEZ0EEMMaQ11XuR0=houqS-C=paxmA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_EB72E43FE49DA8449253018A9FA7422706AAC3C613EX07SJCMBX1fo_"
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 22:44:42 -0000

--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C613EX07SJCMBX1fo_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dear Greg,

As per the PTP over MPLS draft, all intervening LSRs need not be 1588-aware=
.

If we use the EF-PHB with green as drop probability all P routers need not =
know about the PTP LSP. This has been stated in the PTP over MPLS draft.

Even if we were to use the 1588 aware LSRs the actual binding between a PTP=
 LSP and the VPN which is protected by it is known only to the ingress and =
egress PE and not anywhere else. The PTP LSP would have to be tied into the=
 labels only at the ingress and egress PE and this binding / tying up is kn=
own only to them. Hence even if the PTP LSP timing is elicited the time sli=
ces when the labels have to be used is known only to the ingress  and egres=
s PEs.

Thanks

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of G=
reg Mirsky
Sent: Monday, July 09, 2012 10:46 AM
To: Balaji venkat Venkataswami
Cc: l2vpn@ietf.org; Shankar Raman M J; robert@raszuk.net; tictoc@ietf.org
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Balaji,
you've said " There is no information except on the ingress and egress PEs =
that identifies which is the PTP LSP for a particular VPN traffic protected=
 by this scheme."
AFAIK, notion of PTP LSP is not limited to PE's but to all P's that get PTP=
 updates. Would that compromise your method?

Regards,
Greg
On Mon, Jul 9, 2012 at 8:47 AM, Balaji venkat Venkataswami <balajivenkat299=
@gmail.com<mailto:balajivenkat299@gmail.com>> wrote:
Dear Tal,

Comments inline
On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com<mailto:talm=
i@marvell.com>> wrote:
Hi Balaji,

A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:
1.      Since the label hopping mechanism relies on PTP, I understand that =
PTP traffic itself does not use label hopping, right?

The PTP traffic itself does not use label hopping.

2.      Is there something preventing the attacker from attacking PTP, thus=
 causing DoS to the data plane?

It would be difficult for the attacker to identify which LSP is the PTP LSP=
 for a specific VPN traffic (flow / set of flows) that is protected by this=
 scheme. There is no information except on the ingress and egress PEs that =
identifies which is the PTP LSP for a particular VPN traffic protected by t=
his scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV)=
 computed over part of the packet header?

It serves as a digest from which certain specific bits are chosen to become=
 the innermost label. Which bits are chosen depends upon the bitmask exchan=
ged during the control plane.

4.      Is there something in your approach that would prevent an attacker =
from a replay attack?

For a reply attack to succeed, the replay should time the labels correctly =
otherwise the traffic gets rejected.

5.      Looking at "Algorithm 3" I was not sure: does the receiver check tw=
o consequent time slots? I could not see such a check. I am referring to a =
case where the sender transmits at the end of a time slot, and the packet i=
s received at the beginning of the next time slot. That would mean the rece=
iver has to be able to tolerate two concurrent time slots, right?

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm. May=
be a little more fine tuning is required on this.

6.      The security parameters K, TS, A, I are exchanged over a secure lin=
k, which basically assumes there is a pre-shared key between the peer PEs. =
A naive question would be: how is your approach better than just using a st=
andard ICV, based on the existing pre-shared key?

While the ICV may protect against modification of the inner payload one can=
not prevent spoofing attacks if the algorithm for the ICV is deduced. Our s=
cheme provides facility to change the labels from time slice to time slice =
so that guessing what packet belongs to which VPN traffic itself becomes di=
fficult. This is the first line of defense. If we provide ICV alone we prot=
ect against modification but not with replay attacks. The proposed scheme p=
rotects against VPN traffic identification (so replay attacks cannot be mad=
e) and modification as well through the ICV which is the innermost label.

thanks and regards,
balaji , shankar and bhargav

Tal.



--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C613EX07SJCMBX1fo_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#222222;background:white'>Dear Greg,</span><span style=3D'font-size:1=
1.0pt;
font-family:"Calibri","sans-serif"'><o:p></o:p></span></p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'><o:p>&nbsp;</o:p></span><=
/p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'>As per the PTP over MPLS
draft, all intervening LSRs need not be 1588-aware.<o:p></o:p></span></p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'><o:p>&nbsp;</o:p></span><=
/p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'>If we use the EF-PHB with
green as drop probability all P routers need not know about the PTP LSP. Th=
is
has been stated in the PTP over MPLS draft.<o:p></o:p></span></p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'><o:p>&nbsp;</o:p></span><=
/p>

<p class=3DMsoNormal style=3D'background:white'><span style=3D'font-size:11=
.0pt;
font-family:"Calibri","sans-serif";color:#222222'>Even if we were to use th=
e
1588 aware LSRs the actual binding between a PTP LSP and the VPN which is p=
rotected
by it is known only to the ingress and egress PE and not anywhere else. The=
 PTP
LSP would have to be tied into the labels only at the ingress and egress PE=
 and
this binding / tying up is known only to them. Hence even if the PTP LSP ti=
ming
is elicited the time slices when the labels have to be used is known only t=
o
the ingress &nbsp;and egress PEs</span><span style=3D'font-size:9.0pt;font-=
family:
"Arial","sans-serif";color:#222222'>.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Thanks<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> l2vpn-bounces=
@ietf.org
[mailto:l2vpn-bounces@ietf.org] <b>On Behalf Of </b>Greg Mirsky<br>
<b>Sent:</b> Monday, July 09, 2012 10:46 AM<br>
<b>To:</b> Balaji venkat Venkataswami<br>
<b>Cc:</b> l2vpn@ietf.org; Shankar Raman M J; robert@raszuk.net;
tictoc@ietf.org<br>
<b>Subject:</b> Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<o=
:p></o:p></span></p>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Dear Balaji,<br>
you've said &quot; There is no information except on the ingress and egress=
 PEs
that identifies which is the PTP LSP for a particular VPN traffic protected=
 by
this scheme.&quot;<br>
AFAIK, notion of PTP LSP is not limited to PE's but to all P's that get PTP
updates. Would that compromise your method?<br>
<br>
Regards,<br>
Greg<o:p></o:p></p>

<div>

<p class=3DMsoNormal>On Mon, Jul 9, 2012 at 8:47 AM, Balaji venkat Venkatas=
wami
&lt;<a href=3D"mailto:balajivenkat299@gmail.com" target=3D"_blank">balajive=
nkat299@gmail.com</a>&gt;
wrote:<o:p></o:p></p>

<p class=3DMsoNormal>Dear Tal,<o:p></o:p></p>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Comments inline<o:p></o=
:p></p>

<div>

<div>

<p class=3DMsoNormal>On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi &lt;<a
href=3D"mailto:talmi@marvell.com" target=3D"_blank">talmi@marvell.com</a>&g=
t;
wrote:<o:p></o:p></p>

<p class=3DMsoNormal>Hi Balaji,<br>
<br>
A few clarification questions - I think it would be good to clarify these
issues in the draft:<br>
1. &nbsp; &nbsp; &nbsp;Since the label hopping mechanism relies on PTP, I
understand that PTP traffic itself does not use label hopping, right?<o:p><=
/o:p></p>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>The PTP traffic itself does not use label hopping.<o:p=
></o:p></p>

</div>

<div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal>2. &nbsp; &nbsp; &nbsp;Is there something preventing t=
he
attacker from attacking PTP, thus causing DoS to the data plane?<o:p></o:p>=
</p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>It would be difficult for the attacker to identify whi=
ch LSP
is the PTP LSP for a specific VPN traffic (flow / set of flows) that is
protected by this scheme. There is no information except on the ingress and
egress PEs that identifies which is the PTP LSP for a particular VPN traffi=
c
protected by this scheme.&nbsp;<o:p></o:p></p>

</div>

<div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal>3. &nbsp; &nbsp; &nbsp;Is the &quot;additional label&q=
uot;
similar to an Integrity Check Value (ICV) computed over part of the packet
header?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>It serves as a digest from which certain specific bits=
 are
chosen to become the innermost label. Which bits are chosen depends upon th=
e
bitmask exchanged during the control plane.<o:p></o:p></p>

</div>

<div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal>4. &nbsp; &nbsp; &nbsp;Is there something in your appr=
oach
that would prevent an attacker from a replay attack?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>For a reply attack to succeed, the replay should time =
the
labels correctly otherwise the traffic gets rejected.<o:p></o:p></p>

</div>

<div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal>5. &nbsp; &nbsp; &nbsp;Looking at &quot;Algorithm 3&qu=
ot; I
was not sure: does the receiver check two consequent time slots? I could no=
t
see such a check. I am referring to a case where the sender transmits at th=
e
end of a time slot, and the packet is received at the beginning of the next
time slot. That would mean the receiver has to be able to tolerate two
concurrent time slots, right?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>Yes. It is available as +or- 1 unit (usually seconds) =
in the
algorithm. Maybe a little more fine tuning is required on this.<o:p></o:p><=
/p>

</div>

<div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal>6. &nbsp; &nbsp; &nbsp;The security parameters K, TS, =
A, I
are exchanged over a secure link, which basically assumes there is a pre-sh=
ared
key between the peer PEs. A naive question would be: how is your approach
better than just using a standard ICV, based on the existing pre-shared key=
?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<div>

<p class=3DMsoNormal>While the ICV may protect against modification of the =
inner
payload one cannot prevent spoofing attacks if the algorithm for the ICV is
deduced. Our scheme provides facility to change the labels from time slice =
to
time slice so that guessing what packet belongs to which VPN traffic itself
becomes difficult. This is the first line of defense. If we provide ICV alo=
ne
we protect against modification but not with replay attacks. The proposed
scheme protects against VPN traffic identification (so replay attacks canno=
t be
made) and modification as well through the ICV which is the innermost label=
.<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>thanks and regards,<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal>balaji , shankar and bhargav<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-right:0in'>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span style=3D'color:#8=
88888'><br>
Tal.</span><o:p></o:p></p>

</blockquote>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</body>

</html>

--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C613EX07SJCMBX1fo_--

From gregory.mirsky@ericsson.com  Mon Jul  9 16:09:28 2012
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8972511E80FD; Mon,  9 Jul 2012 16:09:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zvWIsQglXj7z; Mon,  9 Jul 2012 16:09:27 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id 5EEDE11E80F7; Mon,  9 Jul 2012 16:09:27 -0700 (PDT)
Received: from eusaamw0711.eamcs.ericsson.se ([147.117.20.178]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id q69N9k4t013946; Mon, 9 Jul 2012 18:09:49 -0500
Received: from EUSAACMS0715.eamcs.ericsson.se ([169.254.1.20]) by eusaamw0711.eamcs.ericsson.se ([147.117.20.178]) with mapi; Mon, 9 Jul 2012 19:09:48 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: Bhargav Bhikkaji <bhargav@force10networks.com>, Greg Mirsky <gregimirsky@gmail.com>, Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 9 Jul 2012 19:09:45 -0400
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1d+re2OFQ5p2bbRUasmakqZL+VkwAKPAjwAADwL9A=
Message-ID: <FE60A4E52763E84B935532D7D9294FF137D7192037@EUSAACMS0715.eamcs.ericsson.se>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com> <CA+RyBmXZLq5S_y2TqisNpEZ0EEMMaQ11XuR0=houqS-C=paxmA@mail.gmail.com> <EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com>
In-Reply-To: <EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_FE60A4E52763E84B935532D7D9294FF137D7192037EUSAACMS0715e_"
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 23:09:28 -0000

--_000_FE60A4E52763E84B935532D7D9294FF137D7192037EUSAACMS0715e_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dear Bhargav,
thank you for your expedient reply to my question.
Yes, technically, PTP LSP can run through LSRs that are not 1588-aware. But=
 that is very unlikely IMHO.
Then I need to note that the http://tools.ietf.org/html/draft-ietf-tictoc-1=
588overmpls-02 had expired last April.

    Regards,
        Greg

________________________________
From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of B=
hargav Bhikkaji
Sent: Monday, July 09, 2012 3:45 PM
To: Greg Mirsky; Balaji venkat Venkataswami
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Greg,

As per the PTP over MPLS draft, all intervening LSRs need not be 1588-aware=
.

If we use the EF-PHB with green as drop probability all P routers need not =
know about the PTP LSP. This has been stated in the PTP over MPLS draft.

Even if we were to use the 1588 aware LSRs the actual binding between a PTP=
 LSP and the VPN which is protected by it is known only to the ingress and =
egress PE and not anywhere else. The PTP LSP would have to be tied into the=
 labels only at the ingress and egress PE and this binding / tying up is kn=
own only to them. Hence even if the PTP LSP timing is elicited the time sli=
ces when the labels have to be used is known only to the ingress  and egres=
s PEs.

Thanks

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of G=
reg Mirsky
Sent: Monday, July 09, 2012 10:46 AM
To: Balaji venkat Venkataswami
Cc: l2vpn@ietf.org; Shankar Raman M J; robert@raszuk.net; tictoc@ietf.org
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Balaji,
you've said " There is no information except on the ingress and egress PEs =
that identifies which is the PTP LSP for a particular VPN traffic protected=
 by this scheme."
AFAIK, notion of PTP LSP is not limited to PE's but to all P's that get PTP=
 updates. Would that compromise your method?

Regards,
Greg
On Mon, Jul 9, 2012 at 8:47 AM, Balaji venkat Venkataswami <balajivenkat299=
@gmail.com<mailto:balajivenkat299@gmail.com>> wrote:
Dear Tal,

Comments inline
On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com<mailto:talm=
i@marvell.com>> wrote:
Hi Balaji,

A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:
1.      Since the label hopping mechanism relies on PTP, I understand that =
PTP traffic itself does not use label hopping, right?

The PTP traffic itself does not use label hopping.

2.      Is there something preventing the attacker from attacking PTP, thus=
 causing DoS to the data plane?

It would be difficult for the attacker to identify which LSP is the PTP LSP=
 for a specific VPN traffic (flow / set of flows) that is protected by this=
 scheme. There is no information except on the ingress and egress PEs that =
identifies which is the PTP LSP for a particular VPN traffic protected by t=
his scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV)=
 computed over part of the packet header?

It serves as a digest from which certain specific bits are chosen to become=
 the innermost label. Which bits are chosen depends upon the bitmask exchan=
ged during the control plane.

4.      Is there something in your approach that would prevent an attacker =
from a replay attack?

For a reply attack to succeed, the replay should time the labels correctly =
otherwise the traffic gets rejected.

5.      Looking at "Algorithm 3" I was not sure: does the receiver check tw=
o consequent time slots? I could not see such a check. I am referring to a =
case where the sender transmits at the end of a time slot, and the packet i=
s received at the beginning of the next time slot. That would mean the rece=
iver has to be able to tolerate two concurrent time slots, right?

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm. May=
be a little more fine tuning is required on this.

6.      The security parameters K, TS, A, I are exchanged over a secure lin=
k, which basically assumes there is a pre-shared key between the peer PEs. =
A naive question would be: how is your approach better than just using a st=
andard ICV, based on the existing pre-shared key?

While the ICV may protect against modification of the inner payload one can=
not prevent spoofing attacks if the algorithm for the ICV is deduced. Our s=
cheme provides facility to change the labels from time slice to time slice =
so that guessing what packet belongs to which VPN traffic itself becomes di=
fficult. This is the first line of defense. If we provide ICV alone we prot=
ect against modification but not with replay attacks. The proposed scheme p=
rotects against VPN traffic identification (so replay attacks cannot be mad=
e) and modification as well through the ICV which is the innermost label.

thanks and regards,
balaji , shankar and bhargav

Tal.



--_000_FE60A4E52763E84B935532D7D9294FF137D7192037EUSAACMS0715e_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:m =3D=20
"http://schemas.microsoft.com/office/2004/12/omml"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.6002.18616" name=3DGENERATOR>
<STYLE>@font-face {
	font-family: Calibri;
}
@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.0in 1.0in 1.0in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman","seri=
f"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman","seri=
f"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman","seri=
f"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline; mso-style-priority: 99
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline; mso-style-priority: 99
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline; mso-style-priority: 99
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline; mso-style-priority: 99
}
SPAN.EmailStyle17 {
	COLOR: #1f497d; FONT-FAMILY: "Calibri","sans-serif"; mso-style-type: perso=
nal-reply
}
.MsoChpDefault {
	mso-style-type: export-only
}
DIV.Section1 {
	page: Section1
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dpurple link=3Dblue>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>Dear Bhargav,</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>thank you for your expedient reply to my=20
question.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>Yes, technically, PTP LSP can run through LSRs t=
hat are=20
not 1588-aware. But that is very unlikely IMHO.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>Then I need to note that the <A=20
href=3D"http://tools.ietf.org/html/draft-ietf-tictoc-1588overmpls-02">http:=
//tools.ietf.org/html/draft-ietf-tictoc-1588overmpls-02</A>&nbsp;had=20
expired last April.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012></SPAN></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>&nbsp;&nbsp;&nbsp; Regards,</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff size=3D2><SP=
AN=20
class=3D637010623-09072012>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
Greg</SPAN></FONT></DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> l2vpn-bounces@ietf.org=20
[mailto:l2vpn-bounces@ietf.org] <B>On Behalf Of </B>Bhargav=20
Bhikkaji<BR><B>Sent:</B> Monday, July 09, 2012 3:45 PM<BR><B>To:</B> Greg=20
Mirsky; Balaji venkat Venkataswami<BR><B>Cc:</B> l2vpn@ietf.org; Shankar Ra=
man M=20
J; tictoc@ietf.org; robert@raszuk.net<BR><B>Subject:</B> RE:=20
draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<BR></FONT><BR></DIV>
<DIV></DIV>
<DIV class=3DSection1>
<P class=3DMsoNormal><SPAN=20
style=3D"FONT-SIZE: 11pt; BACKGROUND: white; COLOR: #222222; FONT-FAMILY: '=
Calibri','sans-serif'">Dear=20
Greg,</SPAN><SPAN=20
style=3D"FONT-SIZE: 11pt; FONT-FAMILY: 'Calibri','sans-serif'"><o:p></o:p><=
/SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'"><o:p>&nbsp;</o:p></SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'">As=20
per the PTP over MPLS draft, all intervening LSRs need not be=20
1588-aware.<o:p></o:p></SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'"><o:p>&nbsp;</o:p></SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'">If=20
we use the EF-PHB with green as drop probability all P routers need not kno=
w=20
about the PTP LSP. This has been stated in the PTP over MPLS=20
draft.<o:p></o:p></SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'"><o:p>&nbsp;</o:p></SPAN></P>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #222222; FONT-FAMILY: 'Calibri','sans-seri=
f'">Even=20
if we were to use the 1588 aware LSRs the actual binding between a PTP LSP =
and=20
the VPN which is protected by it is known only to the ingress and egress PE=
 and=20
not anywhere else. The PTP LSP would have to be tied into the labels only a=
t the=20
ingress and egress PE and this binding / tying up is known only to them. He=
nce=20
even if the PTP LSP timing is elicited the time slices when the labels have=
 to=20
be used is known only to the ingress &nbsp;and egress PEs</SPAN><SPAN=20
style=3D"FONT-SIZE: 9pt; COLOR: #222222; FONT-FAMILY: 'Arial','sans-serif'"=
>.<o:p></o:p></SPAN></P>
<P class=3DMsoNormal><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #1f497d; FONT-FAMILY: 'Calibri','sans-seri=
f'"><o:p>&nbsp;</o:p></SPAN></P>
<P class=3DMsoNormal><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #1f497d; FONT-FAMILY: 'Calibri','sans-seri=
f'">Thanks<o:p></o:p></SPAN></P>
<P class=3DMsoNormal><SPAN=20
style=3D"FONT-SIZE: 11pt; COLOR: #1f497d; FONT-FAMILY: 'Calibri','sans-seri=
f'"><o:p>&nbsp;</o:p></SPAN></P>
<DIV=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df=
 1pt solid; PADDING-LEFT: 0in; PADDING-BOTTOM: 0in; BORDER-LEFT: medium non=
e; PADDING-TOP: 3pt; BORDER-BOTTOM: medium none">
<P class=3DMsoNormal><B><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: 'Tahoma','sans-serif'">From:</SPAN><=
/B><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: 'Tahoma','sans-serif'">=20
l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] <B>On Behalf Of </B>=
Greg=20
Mirsky<BR><B>Sent:</B> Monday, July 09, 2012 10:46 AM<BR><B>To:</B> Balaji=
=20
venkat Venkataswami<BR><B>Cc:</B> l2vpn@ietf.org; Shankar Raman M J;=20
robert@raszuk.net; tictoc@ietf.org<BR><B>Subject:</B> Re:=20
draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt=20
...<o:p></o:p></SPAN></P></DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt">Dear Balaji,<BR>you've s=
aid "=20
There is no information except on the ingress and egress PEs that identifie=
s=20
which is the PTP LSP for a particular VPN traffic protected by this=20
scheme."<BR>AFAIK, notion of PTP LSP is not limited to PE's but to all P's =
that=20
get PTP updates. Would that compromise your=20
method?<BR><BR>Regards,<BR>Greg<o:p></o:p></P>
<DIV>
<P class=3DMsoNormal>On Mon, Jul 9, 2012 at 8:47 AM, Balaji venkat Venkatas=
wami=20
&lt;<A href=3D"mailto:balajivenkat299@gmail.com"=20
target=3D_blank>balajivenkat299@gmail.com</A>&gt; wrote:<o:p></o:p></P>
<P class=3DMsoNormal>Dear Tal,<o:p></o:p></P>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV>
<DIV>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt">Comments inline<o:p></o:=
p></P>
<DIV>
<DIV>
<P class=3DMsoNormal>On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi &lt;<A=20
href=3D"mailto:talmi@marvell.com" target=3D_blank>talmi@marvell.com</A>&gt;=
=20
wrote:<o:p></o:p></P>
<P class=3DMsoNormal>Hi Balaji,<BR><BR>A few clarification questions - I th=
ink it=20
would be good to clarify these issues in the draft:<BR>1. &nbsp; &nbsp;=20
&nbsp;Since the label hopping mechanism relies on PTP, I understand that PT=
P=20
traffic itself does not use label hopping, right?<o:p></o:p></P>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>The PTP traffic itself does not use label=20
hopping.<o:p></o:p></P></DIV>
<DIV>
<DIV>
<P class=3DMsoNormal>&nbsp;<o:p></o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal>2. &nbsp; &nbsp; &nbsp;Is there something preventing=
 the=20
  attacker from attacking PTP, thus causing DoS to the data=20
plane?<o:p></o:p></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>It would be difficult for the attacker to identify whi=
ch LSP=20
is the PTP LSP for a specific VPN traffic (flow / set of flows) that is=20
protected by this scheme. There is no information except on the ingress and=
=20
egress PEs that identifies which is the PTP LSP for a particular VPN traffi=
c=20
protected by this scheme.&nbsp;<o:p></o:p></P></DIV>
<DIV>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal>3. &nbsp; &nbsp; &nbsp;Is the "additional label" sim=
ilar to=20
  an Integrity Check Value (ICV) computed over part of the packet=20
  header?<o:p></o:p></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>It serves as a digest from which certain specific bits=
 are=20
chosen to become the innermost label. Which bits are chosen depends upon th=
e=20
bitmask exchanged during the control plane.<o:p></o:p></P></DIV>
<DIV>
<DIV>
<P class=3DMsoNormal>&nbsp;<o:p></o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal>4. &nbsp; &nbsp; &nbsp;Is there something in your ap=
proach=20
  that would prevent an attacker from a replay attack?<o:p></o:p></P></BLOC=
KQUOTE>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>For a reply attack to succeed, the replay should time =
the=20
labels correctly otherwise the traffic gets rejected.<o:p></o:p></P></DIV>
<DIV>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal>5. &nbsp; &nbsp; &nbsp;Looking at "Algorithm 3" I wa=
s not=20
  sure: does the receiver check two consequent time slots? I could not see =
such=20
  a check. I am referring to a case where the sender transmits at the end o=
f a=20
  time slot, and the packet is received at the beginning of the next time s=
lot.=20
  That would mean the receiver has to be able to tolerate two concurrent ti=
me=20
  slots, right?<o:p></o:p></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>Yes. It is available as +or- 1 unit (usually seconds) =
in the=20
algorithm. Maybe a little more fine tuning is required on=20
this.<o:p></o:p></P></DIV>
<DIV>
<DIV>
<P class=3DMsoNormal>&nbsp;<o:p></o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal>6. &nbsp; &nbsp; &nbsp;The security parameters K, TS=
, A, I=20
  are exchanged over a secure link, which basically assumes there is a=20
  pre-shared key between the peer PEs. A naive question would be: how is yo=
ur=20
  approach better than just using a standard ICV, based on the existing=20
  pre-shared key?<o:p></o:p></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<DIV>
<P class=3DMsoNormal>While the ICV may protect against modification of the =
inner=20
payload one cannot prevent spoofing attacks if the algorithm for the ICV is=
=20
deduced. Our scheme provides facility to change the labels from time slice =
to=20
time slice so that guessing what packet belongs to which VPN traffic itself=
=20
becomes difficult. This is the first line of defense. If we provide ICV alo=
ne we=20
protect against modification but not with replay attacks. The proposed sche=
me=20
protects against VPN traffic identification (so replay attacks cannot be ma=
de)=20
and modification as well through the ICV which is the innermost=20
label.<o:p></o:p></P></DIV>
<DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV>
<DIV>
<P class=3DMsoNormal>thanks and regards,<o:p></o:p></P></DIV>
<DIV>
<P class=3DMsoNormal>balaji , shankar and bhargav<o:p></o:p></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: medium =
none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0in; MARGIN-LEFT: 4.8pt; BORDER-LE=
FT: #cccccc 1pt solid; MARGIN-RIGHT: 0in; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><SPAN=20
  style=3D"COLOR: #888888"><BR>Tal.</SPAN><o:p></o:p></P></BLOCKQUOTE></DIV=
>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P></DIV></BODY></HTML>

--_000_FE60A4E52763E84B935532D7D9294FF137D7192037EUSAACMS0715e_--

From bhargav@force10networks.com  Mon Jul  9 19:58:51 2012
Return-Path: <bhargav@force10networks.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 057D511E80A1; Mon,  9 Jul 2012 19:58:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.091
X-Spam-Level: *
X-Spam-Status: No, score=1.091 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_COM=0.553, HOST_EQ_STATIC=1.172, HOST_MISMATCH_NET=0.311, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b5v3ecdDz9Yk; Mon,  9 Jul 2012 19:58:48 -0700 (PDT)
Received: from mx.force10networks.com (207.47.62.31.static.nextweb.net [207.47.62.31]) by ietfa.amsl.com (Postfix) with ESMTP id 43C6D11E80F1; Mon,  9 Jul 2012 19:58:48 -0700 (PDT)
Received: from EX07-SJC-MBX1.force10networks.com ([fe80:0000:0000:0000:30d7:5b59:107.47.36.196]) by exch7-sjc-fe.force10networks.com ([10.11.0.87]) with mapi; Mon, 9 Jul 2012 19:59:14 -0700
From: Bhargav Bhikkaji <bhargav@force10networks.com>
To: Tal Mizrahi <talmi@marvell.com>, Balaji venkat Venkataswami <balajivenkat299@gmail.com>
Date: Mon, 9 Jul 2012 19:59:12 -0700
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Topic: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
Thread-Index: Ac1d6hqW9ssineDjRymcI0+sUBeL5QAGlYJgABDKUVA=
Message-ID: <EB72E43FE49DA8449253018A9FA7422706AAC3C65C@EX07-SJC-MBX1.force10networks.com>
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743E91@IL-MB01.marvell.com>
In-Reply-To: <74470498B659FA4687F0B0018C19A89C01A0F8743E91@IL-MB01.marvell.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_EB72E43FE49DA8449253018A9FA7422706AAC3C65CEX07SJCMBX1fo_"
MIME-Version: 1.0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Shankar Raman M J <mjsraman@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 02:58:51 -0000

--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C65CEX07SJCMBX1fo_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Tal,

Thanks for your comments. Pls see inline [BB] for response

-Bhargav

From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of T=
al Mizrahi
Sent: Monday, July 09, 2012 12:06 PM
To: Balaji venkat Venkataswami
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Hi Balaji,

Thanks for the prompt and detailed response.
Please see inline.

Regards,
Tal.

From: Balaji venkat Venkataswami [mailto:balajivenkat299@gmail.com]
Sent: Monday, July 09, 2012 6:47 PM
To: Tal Mizrahi
Cc: l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org; robert@raszuk.net
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...

Dear Tal,

Comments inline
On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi <talmi@marvell.com<mailto:talm=
i@marvell.com>> wrote:
Hi Balaji,

A few clarification questions - I think it would be good to clarify these i=
ssues in the draft:
1.      Since the label hopping mechanism relies on PTP, I understand that =
PTP traffic itself does not use label hopping, right?

The PTP traffic itself does not use label hopping.

2.      Is there something preventing the attacker from attacking PTP, thus=
 causing DoS to the data plane?

It would be difficult for the attacker to identify which LSP is the PTP LSP=
 for a specific VPN traffic (flow / set of flows) that is protected by this=
 scheme. There is no information except on the ingress and egress PEs that =
identifies which is the PTP LSP for a particular VPN traffic protected by t=
his scheme.

3.      Is the "additional label" similar to an Integrity Check Value (ICV)=
 computed over part of the packet header?

It serves as a digest from which certain specific bits are chosen to become=
 the innermost label. Which bits are chosen depends upon the bitmask exchan=
ged during the control plane.
[TM] Right. Unless I am missing something, that sounds like a variant of an=
 ICV: it basically produces a label which is a function(packet payload, pre=
-shared secret). That is essentially what an ICV does, unless I am missing =
something?

[BB]: Agreed, the scheme we proposed is a of ICV scheme.

4.      Is there something in your approach that would prevent an attacker =
from a replay attack?

For a reply attack to succeed, the replay should time the labels correctly =
otherwise the traffic gets rejected.
[TM] Right, so assuming the attacker is "fast enough", the attacker can rep=
lay during the time slice (which is ~seconds)?

5.      Looking at "Algorithm 3" I was not sure: does the receiver check tw=
o consequent time slots? I could not see such a check. I am referring to a =
case where the sender transmits at the end of a time slot, and the packet i=
s received at the beginning of the next time slot. That would mean the rece=
iver has to be able to tolerate two concurrent time slots, right?

Yes. It is available as +or- 1 unit (usually seconds) in the algorithm. May=
be a little more fine tuning is required on this.

6.      The security parameters K, TS, A, I are exchanged over a secure lin=
k, which basically assumes there is a pre-shared key between the peer PEs. =
A naive question would be: how is your approach better than just using a st=
andard ICV, based on the existing pre-shared key?

While the ICV may protect against modification of the inner payload one can=
not prevent spoofing attacks if the algorithm for the ICV is deduced. Our s=
cheme provides facility to change the labels from time slice to time slice =
so that guessing what packet belongs to which VPN traffic itself becomes di=
fficult. This is the first line of defense. If we provide ICV alone we prot=
ect against modification but not with replay attacks. The proposed scheme p=
rotects against VPN traffic identification (so replay attacks cannot be mad=
e) and modification as well through the ICV which is the innermost label.
[TM] Since an ICV uses a pre-shared key, even if the algorithm is well-know=
n to the attacker, the attacker cannot forge/spoof it, assuming that the at=
tacker is not exposed to the key. ICV mechanisms typically support anti rep=
lay, e.g., the IPsec AH.

[BB]: We had submitted a draft where certain bits of IPSec digital signatur=
e is used as "additional label". This would help to identify forged/spoofed=
 packet.

http://tools.ietf.org/html/draft-bhargav-l3vpn-inter-provider-optcsec-01

thanks and regards,
balaji , shankar and bhargav

Tal.


--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C65CEX07SJCMBX1fo_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Hi Tal,<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Thanks for your comments. Pls see inline [BB] for response<o=
:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>-Bhargav<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> l2vpn-bounces=
@ietf.org
[mailto:l2vpn-bounces@ietf.org] <b>On Behalf Of </b>Tal Mizrahi<br>
<b>Sent:</b> Monday, July 09, 2012 12:06 PM<br>
<b>To:</b> Balaji venkat Venkataswami<br>
<b>Cc:</b> l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org;
robert@raszuk.net<br>
<b>Subject:</b> RE: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<o=
:p></o:p></span></p>

</div>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Hi Balaji,<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Thanks for the prompt and detailed response.<o:p></o:p></spa=
n></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Please see inline.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Regards,<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:#1F497D'>Tal.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Balaji venkat
Venkataswami [mailto:balajivenkat299@gmail.com] <br>
<b>Sent:</b> Monday, July 09, 2012 6:47 PM<br>
<b>To:</b> Tal Mizrahi<br>
<b>Cc:</b> l2vpn@ietf.org; Shankar Raman M J; tictoc@ietf.org;
robert@raszuk.net<br>
<b>Subject:</b> Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...<o=
:p></o:p></span></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>Dear Tal,<o:p></o:p></p>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Comments inline<o:p></o=
:p></p>

<div>

<p class=3DMsoNormal>On Mon, Jul 9, 2012 at 11:44 AM, Tal Mizrahi &lt;<a
href=3D"mailto:talmi@marvell.com" target=3D"_blank">talmi@marvell.com</a>&g=
t; wrote:<o:p></o:p></p>

<p class=3DMsoNormal>Hi Balaji,<br>
<br>
A few clarification questions - I think it would be good to clarify these
issues in the draft:<br>
1. &nbsp; &nbsp; &nbsp;Since the label hopping mechanism relies on PTP, I
understand that PTP traffic itself does not use label hopping, right?<o:p><=
/o:p></p>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>The PTP traffic itself does not use label hopping.<o:p=
></o:p></p>

</div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal>2. &nbsp; &nbsp; &nbsp;Is there something preventing t=
he
attacker from attacking PTP, thus causing DoS to the data plane?<o:p></o:p>=
</p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>It would be difficult for the attacker to identify whi=
ch LSP
is the PTP LSP for a specific VPN traffic (flow / set of flows) that is
protected by this scheme. There is no information except on the ingress and
egress PEs that identifies which is the PTP LSP for a particular VPN traffi=
c
protected by this scheme.&nbsp;<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal>3. &nbsp; &nbsp; &nbsp;Is the &quot;additional label&q=
uot;
similar to an Integrity Check Value (ICV) computed over part of the packet
header?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>It serves as a digest from which certain specific bits=
 are
chosen to become the innermost label. Which bits are chosen depends upon th=
e
bitmask exchanged during the control plane.<o:p></o:p></p>

<p class=3DMsoNormal><b><i><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";
color:#1F497D'>[TM] Right. Unless I am missing something, that sounds like =
a
variant of an ICV: it basically produces a label which is a function(packet
payload, pre-shared secret). That is essentially what an ICV does, unless I=
 am
missing something?<o:p></o:p></span></i></b></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><b><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif"'>[BB]:
Agreed, the scheme we proposed is a of ICV scheme.<o:p></o:p></span></b></p=
>

</div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal>4. &nbsp; &nbsp; &nbsp;Is there something in your appr=
oach
that would prevent an attacker from a replay attack?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>For a reply attack to succeed, the replay should time =
the
labels correctly otherwise the traffic gets rejected.<o:p></o:p></p>

<p class=3DMsoNormal><b><i><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";
color:#1F497D'>[TM] Right, so assuming the attacker is &#8220;fast enough&#=
8221;, the
attacker can replay during the time slice (which is ~seconds)?</span></i></=
b><span
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
><o:p></o:p></span></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal>5. &nbsp; &nbsp; &nbsp;Looking at &quot;Algorithm 3&qu=
ot; I
was not sure: does the receiver check two consequent time slots? I could no=
t
see such a check. I am referring to a case where the sender transmits at th=
e
end of a time slot, and the packet is received at the beginning of the next
time slot. That would mean the receiver has to be able to tolerate two
concurrent time slots, right?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>Yes. It is available as +or- 1 unit (usually seconds) =
in the
algorithm. Maybe a little more fine tuning is required on this.<o:p></o:p><=
/p>

</div>

<div>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal>6. &nbsp; &nbsp; &nbsp;The security parameters K, TS, =
A, I
are exchanged over a secure link, which basically assumes there is a pre-sh=
ared
key between the peer PEs. A naive question would be: how is your approach
better than just using a standard ICV, based on the existing pre-shared key=
?<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>While the ICV may protect against modification of the =
inner
payload one cannot prevent spoofing attacks if the algorithm for the ICV is
deduced. Our scheme provides facility to change the labels from time slice =
to
time slice so that guessing what packet belongs to which VPN traffic itself
becomes difficult. This is the first line of defense. If we provide ICV alo=
ne
we protect against modification but not with replay attacks. The proposed
scheme protects against VPN traffic identification (so replay attacks canno=
t be
made) and modification as well through the ICV which is the innermost label=
.<o:p></o:p></p>

<p class=3DMsoNormal><b><i><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";
color:#1F497D'>[TM] Since an ICV uses a pre-shared key, even if the algorit=
hm
is well-known to the attacker, the attacker cannot forge/spoof it, assuming
that the attacker is not exposed to the key. ICV mechanisms typically suppo=
rt
anti replay, e.g., the IPsec AH.<o:p></o:p></span></i></b></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><b><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif"'>[BB]:
We had submitted a draft where certain bits of IPSec digital signature is u=
sed
as &quot;additional label&quot;. This would help to identify forged/spoofed
packet. <o:p></o:p></span></b></p>

<p class=3DMsoNormal><b><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif"'><o:p>&nbsp;</o:p></span></b></p>

<p class=3DMsoNormal><b><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif"'>http://tools.ietf.org/html/draft-bhargav-l3vpn-inter-provi=
der-optcsec-01</span></b><span
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
><o:p></o:p></span></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<p class=3DMsoNormal>thanks and regards,<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal>balaji , shankar and bhargav<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span style=3D'color:#8=
88888'><br>
<span class=3Dhoenzb>Tal.</span></span><o:p></o:p></p>

</blockquote>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

</body>

</html>

--_000_EB72E43FE49DA8449253018A9FA7422706AAC3C65CEX07SJCMBX1fo_--

From stbryant@cisco.com  Tue Jul 10 01:07:14 2012
Return-Path: <stbryant@cisco.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76B7F21F8608; Tue, 10 Jul 2012 01:07:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.564
X-Spam-Level: 
X-Spam-Status: No, score=-110.564 tagged_above=-999 required=5 tests=[AWL=0.034, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tkei95qS1-y7; Tue, 10 Jul 2012 01:07:13 -0700 (PDT)
Received: from mtv-iport-4.cisco.com (mtv-iport-4.cisco.com [173.36.130.15]) by ietfa.amsl.com (Postfix) with ESMTP id B235921F8607; Tue, 10 Jul 2012 01:07:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=stbryant@cisco.com; l=2627; q=dns/txt; s=iport; t=1341907661; x=1343117261; h=message-id:date:from:reply-to:mime-version:to:cc:subject: references:in-reply-to; bh=AKj8McmM/euHYOeY4ho48cLa6zOpPyflEcwv+UQALSY=; b=WMiQsf2aGRSxRnIrbamb+enIH3wzYVWIWMPIQkLSQs2MSMeMWnLscbrk mKfl8Wukrw/KAhE8vLa335dhv+WEuPmwjeNUMuFYXigBDJ5R7CmJG3Wch yiVTMLE+t5uN+L9h7H+S2H580MFjzE4BIVCw89cDTwhK5liol33+gEbh4 M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgAFAFLi+0+rRDoI/2dsb2JhbABFgkq1MoEHgiABAQEDARIBAmMBBQsLBAEcFg8JAwIBAgFFBg0BBwEBHodlBQGcN4NIEJxskWIDlTaOH4EEYoJg
X-IronPort-AV: E=Sophos;i="4.77,558,1336348800"; d="scan'208,217";a="51439940"
Received: from mtv-core-3.cisco.com ([171.68.58.8]) by mtv-iport-4.cisco.com with ESMTP; 10 Jul 2012 08:07:40 +0000
Received: from cisco.com (mrwint.cisco.com [64.103.70.36]) by mtv-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id q6A87cB1029980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 10 Jul 2012 08:07:40 GMT
Received: from dhcp-10-61-110-150.cisco.com (localhost [127.0.0.1]) by cisco.com (8.14.4+Sun/8.8.8) with ESMTP id q6A87Zgt001995; Tue, 10 Jul 2012 09:07:36 +0100 (BST)
Message-ID: <4FFBE2C7.4040202@cisco.com>
Date: Tue, 10 Jul 2012 09:07:35 +0100
From: Stewart Bryant <stbryant@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
MIME-Version: 1.0
To: Bhargav Bhikkaji <bhargav@force10networks.com>
Subject: Re: draft-mjsraman-l2vpn-vpls-tictoc-label-hop-00.txt ...
References: <4FF968A8.7060806@raszuk.net> <CC1F6CF4.CA9C%balajivenkat299@gmail.com> <74470498B659FA4687F0B0018C19A89C01A0F8743C0A@IL-MB01.marvell.com> <CAHF4apO2a=Xkv1ZJQqYrg21zanWCBaSbRkUA5WdjkrXU7-RifQ@mail.gmail.com> <CA+RyBmXZLq5S_y2TqisNpEZ0EEMMaQ11XuR0=houqS-C=paxmA@mail.gmail.com> <EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com>
In-Reply-To: <EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com>
Content-Type: multipart/alternative; boundary="------------060106000206020609000401"
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>, Shankar Raman M J <mjsraman@gmail.com>, Balaji venkat Venkataswami <balajivenkat299@gmail.com>, "tictoc@ietf.org" <tictoc@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: stbryant@cisco.com
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 08:07:14 -0000

This is a multi-part message in MIME format.
--------------060106000206020609000401
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit


> If we use the EF-PHB with green as drop probability all P routers need 
> not know about the PTP LSP. This has been stated in the PTP over MPLS 
> draft.
>
Given that forwarders are work conserving, a packet that has already 
started will go to completion, so a high priority  packet arriving after 
the transmit decision has been taken by the forwarder waits. The now 
devalued timing packet goes ahead of all other packets, some of which 
are less devalued by the delay. I am worried that giving timing packet 
priority degrades the network without achieving anything for the timing 
system.

Do we have any measured evidence that sending timing packets with a high 
priority is actually beneficial? If so can someone please point me at it.

Thanks

Stewart



--------------060106000206020609000401
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <blockquote
cite="mid:EB72E43FE49DA8449253018A9FA7422706AAC3C613@EX07-SJC-MBX1.force10networks.com"
      type="cite">
      <div class="Section1">
        <p class="MsoNormal" style="background:white"><span
            style="font-size:11.0pt;
font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#222222">If
            we use the EF-PHB with
            green as drop probability all P routers need not know about
            the PTP LSP. This
            has been stated in the PTP over MPLS draft.<o:p></o:p></span></p>
      </div>
    </blockquote>
    Given that forwarders are work conserving, a packet that has already
    started will go to completion, so a high priority&nbsp; packet arriving
    after the transmit decision has been taken by the forwarder waits.
    The now devalued timing packet goes ahead of all other packets, some
    of which are less devalued by the delay. I am worried that giving
    timing packet priority degrades the network without achieving
    anything for the timing system.<br>
    <br>
    Do we have any measured evidence that sending timing packets with a
    high priority is actually beneficial? If so can someone please point
    me at it.<br>
    <br>
    Thanks<br>
    <br>
    Stewart<br>
    <br>
    <br>
  </body>
</html>

--------------060106000206020609000401--

From Internet-Drafts@ietf.org  Wed Jul 11 08:53:17 2012
Return-Path: <Internet-Drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85B6221F853B; Wed, 11 Jul 2012 08:53:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O1eTewAv0xS0; Wed, 11 Jul 2012 08:53:16 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9950821F8532; Wed, 11 Jul 2012 08:53:14 -0700 (PDT)
MIME-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D ACTION:draft-ietf-l2vpn-vpls-mcast-11.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p3
Message-ID: <20120711155314.24816.62516.idtracker@ietfa.amsl.com>
Date: Wed, 11 Jul 2012 08:53:14 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jul 2012 15:53:17 -0000

--NextPart

A new Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Layer 2 Virtual Private Networks Working Group of the IETF.

    Title         : Multicast in VPLS
    Author(s)     : R. Aggarwal, et al
    Filename      : draft-ietf-l2vpn-vpls-mcast
    Pages         : 47 
    Date          : July 11, 2012 
    
   This document describes a solution for overcoming a subset of the
   limitations of existing VPLS multicast solutions. It describes
   procedures for VPLS multicast that utilize multicast trees in the
   sevice provider (SP) network.  One such multicast tree can be shared
   between multiple VPLS instances.  Procedures by which a single
   multicast tree in the SP network can be used to carry traffic
   belonging only to a specified set of one or more IP multicast streams
   from one or more VPLSes are also described.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-l2vpn-vpls-mcast-11.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body; name="draft-ietf-l2vpn-vpls-mcast";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2012-07-11085314.I-D@ietf.org>


--NextPart--

From internet-drafts@ietf.org  Sun Jul 15 22:27:36 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5ED4821F85C2; Sun, 15 Jul 2012 22:27:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.515
X-Spam-Level: 
X-Spam-Status: No, score=-102.515 tagged_above=-999 required=5 tests=[AWL=0.084, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3yMCBV0U-iqO; Sun, 15 Jul 2012 22:27:35 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD9B521F85C5; Sun, 15 Jul 2012 22:27:35 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-evpn-01.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p3
Message-ID: <20120716052735.29514.10923.idtracker@ietfa.amsl.com>
Date: Sun, 15 Jul 2012 22:27:35 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2012 05:27:36 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Layer 2 Virtual Private Networks Working =
Group of the IETF.

	Title           : BGP MPLS Based Ethernet VPN
	Author(s)       : Ali Sajassi
                          Rahul Aggarwal
                          Wim Henderickx
                          Florin Balus
                          Aldrin Isaac
                          James Uttaro
	Filename        : draft-ietf-l2vpn-evpn-01.txt
	Pages           : 43
	Date            : 2012-07-15

Abstract:
   This document describes procedures for BGP MPLS based Ethernet VPNs
   (E-VPN).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-evpn

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-evpn-01

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-l2vpn-evpn-01


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From internet-drafts@ietf.org  Mon Jul 16 08:12:55 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 139DC21F8760; Mon, 16 Jul 2012 08:12:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.527
X-Spam-Level: 
X-Spam-Status: No, score=-102.527 tagged_above=-999 required=5 tests=[AWL=0.072, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gUe8+GaIKlfF; Mon, 16 Jul 2012 08:12:54 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DF5A21F8707; Mon, 16 Jul 2012 08:12:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-02.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p3
Message-ID: <20120716151254.26553.97170.idtracker@ietfa.amsl.com>
Date: Mon, 16 Jul 2012 08:12:54 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2012 15:12:55 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Layer 2 Virtual Private Networks Working =
Group of the IETF.

	Title           : PIM Snooping over VPLS
	Author(s)       : Olivier Dornon
                          Jayant Kotalwar
                          Jeffrey Zhang
                          Venu Hemige
	Filename        : draft-ietf-l2vpn-vpls-pim-snooping-02.txt
	Pages           : 39
	Date            : 2012-07-16

Abstract:
   In Virtual Private LAN Service (VPLS), as also in IEEE Bridged
   Networks, the switches simply flood multicast traffic on all ports in
   the LAN by default.  IGMP Snooping is commonly deployed to ensure
   multicast traffic is not forwarded on ports without IGMP receivers.
   The procedures and recommendations for IGMP Snooping are defined in
   [IGMP-SNOOP].  But when any protocol other than IGMP is used, the
   common practice is to simply flood multicast traffic to all ports.
   PIM-SM, PIM-SSM, PIM-BIDIR are widely deployed routing protocols.
   PIM Snooping procedures are important to restrict multicast traffic
   to only the routers interested in receiving such traffic.

   While most of the PIM Snooping procedures defined here also apply to
   IEEE Bridged Networks, VPLS demands certain special procedures due to
   the split-horizon rules that require the Provider Edge (PE) devices
   to co-operate.  This document describes the procedures and
   recommendations for PIM-Snooping in VPLS to facilitate replication to
   only those ports behind which there are interested PIM routers and/or
   IGMP hosts.  This document also describes procedures for PIM Proxy.
   PIM Proxy is required on PEs for VPLS Multicast to work correctly
   when Join suppression is enabled in the VPLS.  PIM Proxy also helps
   scale VPLS Multicast much better than just PIM Snooping.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-vpls-pim-snooping

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-vpls-pim-snooping-02

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-l2vpn-vpls-pim-snooping-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nabil.n.bitar@verizon.com  Mon Jul 16 10:49:56 2012
Return-Path: <nabil.n.bitar@verizon.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B198911E8276 for <l2vpn@ietfa.amsl.com>; Mon, 16 Jul 2012 10:49:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.319
X-Spam-Level: 
X-Spam-Status: No, score=-3.319 tagged_above=-999 required=5 tests=[AWL=0.279,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1RwIvjcHuIyY for <l2vpn@ietfa.amsl.com>; Mon, 16 Jul 2012 10:49:55 -0700 (PDT)
Received: from fldsmtpe02.verizon.com (fldsmtpe02.verizon.com [140.108.26.141]) by ietfa.amsl.com (Postfix) with ESMTP id 8BF5811E8275 for <l2vpn@ietf.org>; Mon, 16 Jul 2012 10:49:55 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: false
Received: from unknown (HELO fldsmtpi03.verizon.com) ([166.68.71.145]) by fldsmtpe02.verizon.com with ESMTP; 16 Jul 2012 17:50:40 +0000
From: "Bitar, Nabil N" <nabil.n.bitar@verizon.com>
X-IronPort-AV: E=Sophos;i="4.77,594,1336348800";  d="scan'208,217";a="299268027"
Received: from fldp1lumxc7hb05.verizon.com (HELO FLDP1LUMXC7HB05.us.one.verizon.com) ([166.68.75.87]) by fldsmtpi03.verizon.com with ESMTP; 16 Jul 2012 17:50:39 +0000
Received: from fldp1lumxc7v63.us.one.verizon.com ([166.68.45.45]) by FLDP1LUMXC7HB05.us.one.verizon.com ([166.68.75.87]) with mapi; Mon, 16 Jul 2012 13:50:39 -0400
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Mon, 16 Jul 2012 13:50:37 -0400
Subject: [l2vpn] IETF-84 Vancouver: Internet Draft final submission deadline today (July 16) by 17:00 PT
Thread-Topic: [l2vpn] IETF-84 Vancouver: Internet Draft final submission deadline today (July 16) by 17:00 PT
Thread-Index: Ac1je4KjuREMjkPZQj2YwFfXBTZfYQ==
Message-ID: <CC29CB6B.36E32%nabil.n.bitar@verizon.com>
In-Reply-To: <CC18CF15.345D5%nabil.n.bitar@verizon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.10.0.110310
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_CC29CB6B36E32nabilnbitarverizoncom_"
MIME-Version: 1.0
Cc: Giles Heron <giheron@cisco.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2012 17:49:56 -0000

--_000_CC29CB6B36E32nabilnbitarverizoncom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi,
Just a reminder that the deadline is today (July 16) by 17:00 PT for draft =
final submission.

Thanks,
Nabil and Giles


From: "Bitar, Nabil N" <nabil.n.bitar@one.verizon.com<mailto:nabil.n.bitar@=
one.verizon.com>>
Date: Tue, 3 Jul 2012 16:37:49 -0400
To: "l2vpn@ietf.org<mailto:l2vpn@ietf.org>" <l2vpn@ietf.org<mailto:l2vpn@ie=
tf.org>>
Cc: Giles Heron <giheron@cisco.com<mailto:giheron@cisco.com>>
Subject: [l2vpn] L2VPN Agenda Slot Call for IETF 84 - Vancouver

Hi L2VPN WG.
Please let us know if you have a time-slot request for the L2VPN session at=
 IETF 84=96Vancouver. Please,  email us your request by Sunday July 15, 201=
2 along with the following information:
1) Draft title
2) Presenter name
3) Requested duration

Please note that priority will be given to drafts that are clearly within t=
he scope of the current L2VPN charter.

Additional key dates to remember are:
2012-07-09 (Monday): Internet Draft Cut-off for initial document (-00) subm=
ission by 17:00 PT (UTC -7)
2012-07-16 (Monday): Internet Draft final submission cut-off by 17:00 PT (U=
TC -7)

Thanks,
Nabil and Giles

--_000_CC29CB6B36E32nabilnbitarverizoncom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
 -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div>Hi,</div><div>Just a reminder t=
hat the deadline is today (July 16) by 17:00 PT for draft final submission.=
</div><div><br></div><div>Thanks,</div><div>Nabil and Giles</div><div><br><=
/div><div><br></div><span id=3D"OLK_SRC_BODY_SECTION"><div style=3D"font-fa=
mily:Calibri; font-size:11pt; text-align:left; color:black; BORDER-BOTTOM: =
medium none; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 0=
in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium=
 none; PADDING-TOP: 3pt"><span style=3D"font-weight:bold">From: </span> &qu=
ot;Bitar, Nabil N&quot; &lt;<a href=3D"mailto:nabil.n.bitar@one.verizon.com=
">nabil.n.bitar@one.verizon.com</a>&gt;<br><span style=3D"font-weight:bold"=
>Date: </span> Tue, 3 Jul 2012 16:37:49 -0400<br><span style=3D"font-weight=
:bold">To: </span> &quot;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.org</=
a>&quot; &lt;<a href=3D"mailto:l2vpn@ietf.org">l2vpn@ietf.org</a>&gt;<br><s=
pan style=3D"font-weight:bold">Cc: </span> Giles Heron &lt;<a href=3D"mailt=
o:giheron@cisco.com">giheron@cisco.com</a>&gt;<br><span style=3D"font-weigh=
t:bold">Subject: </span> [l2vpn] L2VPN Agenda Slot Call for IETF 84 - Vanco=
uver<br></div><div><br></div><div><div style=3D"word-wrap: break-word; -web=
kit-nbsp-mode: space; -webkit-line-break: after-white-space; color: rgb(0, =
0, 0); font-size: 14px; font-family: Calibri, sans-serif; "><div><span clas=
s=3D"Apple-style-span" style=3D"font-size: 15px; font-family: Calibri, Verd=
ana, Helvetica, Arial; ">Hi L2VPN WG.</span></div><span id=3D"OLK_SRC_BODY_=
SECTION"><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space=
; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14=
px; font-family: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTION"><=
div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-=
line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-f=
amily: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTION"><div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sans-se=
rif; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: a=
fter-white-space; "><span id=3D"OLK_SRC_BODY_SECTION"><div><div><font face=
=3D"Calibri,Verdana,Helvetica,Arial"><span style=3D"font-size:11pt">
Please let us know if you have a time-slot request for the L2VPN session at=
 IETF 84=96Vancouver. Please, &nbsp;email us your request by Sunday July 15=
, 2012 along with the following information:<br>
1) Draft title<br>
2) Presenter name<br>
3) Requested duration<br><br>
Please note that priority will be given to drafts that are clearly within t=
he scope of the current L2VPN charter.<br><br>
Additional key dates to remember are:</span></font></div></div></span></div=
></div></span></div></div></span></div></div></span><div><div> <strong>2012=
-07-09 (Monday):</strong> Internet Draft Cut-off for initial document (-00)=
 submission by

                17:00 PT (UTC -7)</div>

              <div> <strong>2012-07-16 (Monday):</strong> Internet Draft fi=
nal submission cut-off by 17:00 PT (UTC -7)</div></div><span id=3D"OLK_SRC_=
BODY_SECTION"><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-siz=
e: 14px; font-family: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTI=
ON"><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -we=
bkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; f=
ont-family: Calibri, sans-serif; "><span id=3D"OLK_SRC_BODY_SECTION"><div><=
div style=3D"color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sa=
ns-serif; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-bre=
ak: after-white-space; "><div><font class=3D"Apple-style-span" face=3D"mono=
space"><span class=3D"Apple-style-span" style=3D"white-space: pre; "><font =
class=3D"Apple-style-span" face=3D"Calibri,sans-serif"><span class=3D"Apple=
-style-span" style=3D"white-space: normal;"><br></span></font></span></font=
></div><span id=3D"OLK_SRC_BODY_SECTION"><div><div><font face=3D"Calibri,Ve=
rdana,Helvetica,Arial"><span style=3D"font-size:11pt">
Thanks,<br>Nabil and Giles<br></span></font></div></div></span></div></div>=
</span></div></div></span></div></div></span></div></div></span></body></ht=
ml>

--_000_CC29CB6B36E32nabilnbitarverizoncom_--

From internet-drafts@ietf.org  Mon Jul 16 14:46:01 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0559711E8115; Mon, 16 Jul 2012 14:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.509
X-Spam-Level: 
X-Spam-Status: No, score=-102.509 tagged_above=-999 required=5 tests=[AWL=0.090, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I+tJPlHxQ13n; Mon, 16 Jul 2012 14:46:00 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 163E311E810B; Mon, 16 Jul 2012 14:46:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-ipls-10.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p3
Message-ID: <20120716214600.7891.80482.idtracker@ietfa.amsl.com>
Date: Mon, 16 Jul 2012 14:46:00 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2012 21:46:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Layer 2 Virtual Private Networks Working =
Group of the IETF.

	Title           : IP-Only LAN Service (IPLS)
	Author(s)       : Himanshu Shah
                          Eric Rosen
                          Francois Le Faucheur
                          Giles Heron
	Filename        : draft-ietf-l2vpn-ipls-10.txt
	Pages           : 25
	Date            : 2012-07-16

Abstract:
   A Virtual Private LAN Service (VPLS) [VPLS] is used to interconnect
   systems across a wide-area or metropolitan-area network, making it
   appear that they are on a private LAN.  The systems which are
   interconnected may themselves be LAN switches.  If, however, they
   are IP hosts or IP routers, certain simplifications to the operation
   of the VPLS are possible.  We call this simplified type of VPLS an
   "IP-only LAN Service" (IPLS).  In an IPLS, as in a VPLS, LAN
   interfaces are run in promiscuous mode, and frames are forwarded
   based on their destination MAC addresses.  However, the maintenance
   of the MAC forwarding tables is done via signaling, rather than via
   the MAC address learning procedures specified in [IEEE 802.1D].
   This draft specifies the protocol extensions and procedures for
   support of the IPLS service.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-ipls

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-ipls-10

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-l2vpn-ipls-10


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From giles.heron@gmail.com  Wed Jul 18 11:28:08 2012
Return-Path: <giles.heron@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DE6911E8157 for <l2vpn@ietfa.amsl.com>; Wed, 18 Jul 2012 11:28:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjL06B94vl2D for <l2vpn@ietfa.amsl.com>; Wed, 18 Jul 2012 11:28:07 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9BCF011E813B for <l2vpn@ietf.org>; Wed, 18 Jul 2012 11:28:07 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so3084663pbc.31 for <l2vpn@ietf.org>; Wed, 18 Jul 2012 11:28:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:date:message-id :cc:to:mime-version:x-mailer; bh=d5y+MQJVaPtjAyHt177T5WrLTL321koc0X3VX74dkFg=; b=QpyLSvJSyqkCMGxmt8wOnRoB2AbKju2OY7MwP0ZqTAhlwwJWjUKyIkK3cWw/OU8h8W 8UgBAXjMoA8NMIzMSGYNY3cc6Wb9+0CYk0FtNlZOqJucX0EyWRRL2s7/4DBECheSPRhY LQbFNIsS/pmWTMm65AC037on0Qnx3a3WP9fPyZg/32zLwc5C8NEMkEGJJ0RalMC8pJoH HpAHInC3b3jhZ9ZeJjfYg0cGSGAo8g6y9r5PegpD5DXwiHBzguoD96D7dHZtCHdSbN0H 8qDhpgF34Bm3TAQJ9lkEGQ+QNxvbjtGSzx+1fBekXkFgQNYtIuOVVtrZL3zBrMfd9MqP 4mrA==
Received: by 10.68.224.39 with SMTP id qz7mr9364811pbc.127.1342636138479; Wed, 18 Jul 2012 11:28:58 -0700 (PDT)
Received: from dhcp-10-155-68-159.cisco.com (128-107-239-233.cisco.com. [128.107.239.233]) by mx.google.com with ESMTPS id he9sm58343pbc.68.2012.07.18.11.28.57 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 18 Jul 2012 11:28:57 -0700 (PDT)
From: Giles Heron <giles.heron@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Subject: IETF 84 Agenda
Date: Wed, 18 Jul 2012 19:28:53 +0100
Message-Id: <1244B2AF-8E1D-4C48-A141-8A32AB5C7FFB@gmail.com>
To: l2vpn@ietf.org
Mime-Version: 1.0 (Apple Message framework v1278)
X-Mailer: Apple Mail (2.1278)
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jul 2012 18:28:08 -0000

Hi all,

I've uploaded a first cut of the L2VPN agenda for IETF84 at:

http://datatracker.ietf.org/meeting/84/agenda/l2vpn

please do let me and Nabil know if there are any errors/omissions.

Giles

From giles.heron@gmail.com  Thu Jul 19 08:59:18 2012
Return-Path: <giles.heron@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E59E421F8714 for <l2vpn@ietfa.amsl.com>; Thu, 19 Jul 2012 08:59:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dbG8KCGnWQAc for <l2vpn@ietfa.amsl.com>; Thu, 19 Jul 2012 08:59:17 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id 6467721F8681 for <l2vpn@ietf.org>; Thu, 19 Jul 2012 08:59:16 -0700 (PDT)
Received: by pbcwy7 with SMTP id wy7so4743277pbc.31 for <l2vpn@ietf.org>; Thu, 19 Jul 2012 09:00:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=UeggJnaLto5rCGtGlp70FSG2P/TjCdkHzzIKs96dq0E=; b=yZRneB/JaWAyl5Zj68gNytF8+2ZWuQy5M8TKxtsPRAlBwaF7gpWstVRgLkGx3EqY/m 5p/gDk+4mlvUx2zKwX1HyOl4QplQBaT4trqLvLqMR92TkUjxKfMLCXYRau7CByfHSoIZ tHSXY327BfuUFO75SOIEC8Jmcn+JqU8KAEQ9V3oiospyaIZ+XrurNyqg7z0SRe9B0WJV Nn/Ycre8kUXyWYkjq+F9Iw3NU4007fH/9cYUJhKx5+oP7mutP4BHGw4JXe5k+csMAvAm aPSXYgyNcipLEbVOmDENOkTK6FUhuc8NRRflCQPv0q2eLINJEJI3r99YU8PaMNzodD1F SZMg==
Received: by 10.68.196.228 with SMTP id ip4mr6232584pbc.82.1342713609900; Thu, 19 Jul 2012 09:00:09 -0700 (PDT)
Received: from [10.155.80.70] (128-107-239-233.cisco.com. [128.107.239.233]) by mx.google.com with ESMTPS id hz10sm2025119pbc.32.2012.07.19.09.00.08 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 19 Jul 2012 09:00:09 -0700 (PDT)
Subject: Re: IETF 84 Agenda
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Giles Heron <giles.heron@gmail.com>
In-Reply-To: <1244B2AF-8E1D-4C48-A141-8A32AB5C7FFB@gmail.com>
Date: Thu, 19 Jul 2012 17:00:08 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <38E75CFF-21FE-41C6-A843-9D0EA9AEF7AD@gmail.com>
References: <1244B2AF-8E1D-4C48-A141-8A32AB5C7FFB@gmail.com>
To: l2vpn@ietf.org
X-Mailer: Apple Mail (2.1278)
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2012 15:59:18 -0000

Hi again,

I've updated the agenda to add in one or two slots that we missed or =
that came in as late requests.

The agenda is now 100% full - and please note that all speakers have 10 =
minutes even if they asked for more.   I'd encourage speakers to keep =
their "presentation" to 5 minutes to leave half the time free for =
discussion.  We're going to have to be ruthless about shutting the mic =
down at the end of the 10 minute slot, so I'd also encourage attendees =
to keep questions short, sweet and to the point.

As with David Sinicrope's mail on the PWE3 list I'd ask those listed on =
the agenda to send an email to Nabil and me noting what objectives and =
issues need to be discussed and resolved via the presentation.  It'd be =
helpful if you could include your slides with that email (we need to =
have slides by 9am Vancouver time on Wednesday 1st August at the very =
very latest).

Also I'd like to ask now if we could please have a volunteer to take =
notes, and another to jabber scribe.  Thanks!

Giles

On 18 Jul 2012, at 19:28, Giles Heron wrote:

> Hi all,
>=20
> I've uploaded a first cut of the L2VPN agenda for IETF84 at:
>=20
> http://datatracker.ietf.org/meeting/84/agenda/l2vpn
>=20
> please do let me and Nabil know if there are any errors/omissions.
>=20
> Giles


From lucy.yong@huawei.com  Mon Jul 23 16:54:05 2012
Return-Path: <lucy.yong@huawei.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FE5911E80F4 for <l2vpn@ietfa.amsl.com>; Mon, 23 Jul 2012 16:54:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.402
X-Spam-Level: 
X-Spam-Status: No, score=-6.402 tagged_above=-999 required=5 tests=[AWL=0.196,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id in9VfH98xE0z for <l2vpn@ietfa.amsl.com>; Mon, 23 Jul 2012 16:54:04 -0700 (PDT)
Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) by ietfa.amsl.com (Postfix) with ESMTP id 24E5B11E80F1 for <l2vpn@ietf.org>; Mon, 23 Jul 2012 16:54:04 -0700 (PDT)
Received: from 172.18.9.243 (EHLO dfweml201-edg.china.huawei.com) ([172.18.9.243]) by dfwrg01-dlp.huawei.com (MOS 4.2.3-GA FastPath) with ESMTP id AIG94372; Mon, 23 Jul 2012 19:54:03 -0400 (EDT)
Received: from DFWEML405-HUB.china.huawei.com (10.193.5.102) by dfweml201-edg.china.huawei.com (172.18.9.107) with Microsoft SMTP Server (TLS) id 14.1.323.3; Mon, 23 Jul 2012 16:51:48 -0700
Received: from DFWEML506-MBX.china.huawei.com ([10.124.31.111]) by dfweml405-hub.china.huawei.com ([10.193.5.102]) with mapi id 14.01.0323.003; Mon, 23 Jul 2012 16:51:50 -0700
From: Lucy yong <lucy.yong@huawei.com>
To: "l2vpn@ietf.org" <l2vpn@ietf.org>
Subject: IPR on draft-sajassi-l2vpn-evpn-etree-00
Thread-Topic: IPR on draft-sajassi-l2vpn-evpn-etree-00
Thread-Index: Ac1pLh+agWCd4WbIRceObqnMe6edFA==
Date: Mon, 23 Jul 2012 23:51:50 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D447E3A56@dfweml506-mbx>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.47.134.194]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D447E3A56dfweml506mbx_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2012 23:54:05 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D447E3A56dfweml506mbx_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Is there an IPR related to this solution?

Lucy

--_000_2691CE0099834E4A9C5044EEC662BB9D447E3A56dfweml506mbx_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Is there an IPR related to this solution?<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Lucy<o:p></o:p></p>
</div>
</body>
</html>

--_000_2691CE0099834E4A9C5044EEC662BB9D447E3A56dfweml506mbx_--

From sajassi@cisco.com  Mon Jul 23 17:28:49 2012
Return-Path: <sajassi@cisco.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59F2811E80FA for <l2vpn@ietfa.amsl.com>; Mon, 23 Jul 2012 17:28:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ErT9AtDvD-l6 for <l2vpn@ietfa.amsl.com>; Mon, 23 Jul 2012 17:28:48 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2A00B11E80F6 for <l2vpn@ietf.org>; Mon, 23 Jul 2012 17:28:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=sajassi@cisco.com; l=4025; q=dns/txt; s=iport; t=1343089721; x=1344299321; h=from:to:subject:date:message-id:in-reply-to:mime-version; bh=XpeSpE+FJICAQhFPRr+yyJeiicSKZE1RKGyDtAz2Pb8=; b=QtoJbfvJJ6hAPS+VHyRq0V1GXxlbX+Q6CQqfU6DpIiBBlf568pCBupA2 uN5Trxt+fnVuhBdkt1SeT7HFbvHPffTUQN4hQI5a7uyq79gzjWqEvj4Ks b/SmsyTfQNDKqIfFK26QKh3+XTiLt73yYKMe1KiCS8wo/hPI40DDsMJik Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhAFAI7rDVCtJV2d/2dsb2JhbABFgkqCYbQ3gQeCIAECBBIBGl4BCAQNAwECKDkUCQgBAQQBEhsHh2sBnDigDYtNhlMDlUmOJ4Fmgl8
X-IronPort-AV: E=Sophos;i="4.77,641,1336348800";  d="scan'208,217";a="104575186"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-6.cisco.com with ESMTP; 24 Jul 2012 00:28:40 +0000
Received: from xhc-rcd-x03.cisco.com (xhc-rcd-x03.cisco.com [173.37.183.77]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id q6O0SeCV027119 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 24 Jul 2012 00:28:40 GMT
Received: from xmb-aln-x13.cisco.com ([fe80::5404:b599:9f57:834b]) by xhc-rcd-x03.cisco.com ([173.37.183.77]) with mapi id 14.02.0298.004; Mon, 23 Jul 2012 19:28:40 -0500
From: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
To: Lucy yong <lucy.yong@huawei.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>
Subject: Re: IPR on draft-sajassi-l2vpn-evpn-etree-00
Thread-Topic: IPR on draft-sajassi-l2vpn-evpn-etree-00
Thread-Index: Ac1pLh+agWCd4WbIRceObqnMe6edFP//6MMA
Date: Tue, 24 Jul 2012 00:28:39 +0000
Message-ID: <CC333896.811F%sajassi@cisco.com>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D447E3A56@dfweml506-mbx>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.1.120420
x-originating-ip: [10.154.212.146]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19060.001
x-tm-as-result: No--24.321200-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: multipart/alternative; boundary="_000_CC333896811Fsajassiciscocom_"
MIME-Version: 1.0
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2012 00:28:49 -0000

--_000_CC333896811Fsajassiciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


No, there is no IPR on this draft and it was intended as such to come up wi=
th a simple solution with no IPR on it.

Cheers,
Ali

From: Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>
Date: Monday, July 23, 2012 4:51 PM
To: "l2vpn@ietf.org<mailto:l2vpn@ietf.org>" <l2vpn@ietf.org<mailto:l2vpn@ie=
tf.org>>
Subject: IPR on draft-sajassi-l2vpn-evpn-etree-00

Is there an IPR related to this solution?

Lucy

--_000_CC333896811Fsajassiciscocom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <B0A01B18FAD05B429E3B2AD24D1495E3@cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div><br>
</div>
<div>No, there is no IPR on this draft and it was intended as such to come =
up with a simple solution with no IPR on it.</div>
<div><br>
</div>
<div>Cheers,</div>
<div>Ali</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Lucida Grande; font-size:11pt; text-align:left; c=
olor:black; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-B=
OTTOM: 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt =
solid; BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Lucy yong &lt;<a href=3D"mail=
to:lucy.yong@huawei.com">lucy.yong@huawei.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Monday, July 23, 2012 4:51 PM=
<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:l2vpn@i=
etf.org">l2vpn@ietf.org</a>&quot; &lt;<a href=3D"mailto:l2vpn@ietf.org">l2v=
pn@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>IPR on draft-sajassi-l2vpn=
-evpn-etree-00<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Is there an IPR related to this solution?<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Lucy<o:p></o:p></p>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_CC333896811Fsajassiciscocom_--

From internet-drafts@ietf.org  Sun Jul 29 23:34:32 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4163811E812C; Sun, 29 Jul 2012 23:34:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, FUZZY_VLIUM=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JfKV9DVPpLZt; Sun, 29 Jul 2012 23:34:31 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C504911E811A; Sun, 29 Jul 2012 23:34:31 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-ldp-vpls-broadcast-exten-04.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.32
Message-ID: <20120730063431.2665.2171.idtracker@ietfa.amsl.com>
Date: Sun, 29 Jul 2012 23:34:31 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Jul 2012 06:34:32 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Layer 2 Virtual Private Networks Working =
Group of the IETF.

	Title           : Extension to LDP-VPLS for Ethernet Broadcast and Multica=
st
	Author(s)       : Frederic Jounay
                          Yuji Kamite
                          Zhihua Liu
                          Manuel Paul
                          Ruediger Kunze
                          Mach(Guoyi) Chen
                          Lizhong Jin
	Filename        : draft-ietf-l2vpn-ldp-vpls-broadcast-exten-04.txt
	Pages           : 20
	Date            : 2012-07-29

Abstract:
   This document proposes a simple extension to LDP-VPLS to improve
   bandwidth efficiency for Ethernet broadcast/multicast traffic
   within a carrier's network. It makes use of unidirectional
   point-to-multipoint PseudoWires to minimise payload frame duplication
   on physical links.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-ldp-vpls-broadcast-exten

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-ldp-vpls-broadcast-exten-04

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-l2vpn-ldp-vpls-broadcast-ex=
ten-04


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From internet-drafts@ietf.org  Mon Jul 30 00:49:20 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 271B521F85DB; Mon, 30 Jul 2012 00:49:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0lTmzAIwUaf7; Mon, 30 Jul 2012 00:49:19 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D21E21F85F3; Mon, 30 Jul 2012 00:49:19 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-etree-frwk-01.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.32
Message-ID: <20120730074919.14402.43131.idtracker@ietfa.amsl.com>
Date: Mon, 30 Jul 2012 00:49:19 -0700
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Jul 2012 07:49:20 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Layer 2 Virtual Private Networks Working =
Group of the IETF.

	Title           : A Framework for E-Tree Service over MPLS Network
	Author(s)       : Simon Delord
                          Frederic Jounay
                          Lucy Yong
                          Lizhong Jin
                          Yuji Kamite
                          Wim Henderickx
	Filename        : draft-ietf-l2vpn-etree-frwk-01.txt
	Pages           : 29
	Date            : 2012-07-30

Abstract:
   This document proposes a solution framework for supporting Metro
   Ethernet Forum (MEF) Ethernet Tree (E-Tree) services over a
   Multiprotocol Label Switching (MPLS) network. The objective is to
   provide a simple and effective approach to emulate E-Tree services
   in addition to Ethernet LAN (E-LAN) services on an existing MPLS
   network.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-etree-frwk

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-etree-frwk-01

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-l2vpn-etree-frwk-01


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

