Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Glen, All things equal, I would rather not pay the 5% (or whatever the number happens to be) bandwidth tax in the new system, so I would definitely prefer the zero-overhead encryption method. The argument that was brought against it before was that we do not have a CableLabs spec (or any spec for that matter) to fall back on and development of a similar spec for 1904.4 would derail our timelines. Under that assumption (apparently, wrong), and considering the option of not having any security or having some security (MACSec with its overhead, etc.), I believe it is a no-brainer to go with option for security. PON is a shared medium in downstream so we do need something to assure data privacy. Perhaps it was not obvious to me (and that is on me) that we were proceeding with the zero-overhead encryption method and the spec build will not affect us negatively. I am sorry for confusion. I did not mean to throw in a wrench into this discussion. Regards Marek From: Glen Kramer <glen.kramer@xxxxxxxxxxxx> Hi Marek, This is a strange turn of events. When we first discussed the MACSec vs. Zero-Overhead in January, I believe you made a comment that 5% of extra overhead is significant enough to prefer the Zero-Overhead method (Sorry if I misunderstood what you said). I believe Mark made a similar comment too. At the same time, no specific technical issues were identified with zero-overhead method and there weren’t any strong objections to it besides the concerns of its future post-quantum cipher-agility. So, I assumed that we had an informal agreement to proceed with the Zero-overhead method and I reiterated that understanding before I presented my slides at the last consensus call. To be clear, the latest proposal relies on the EAPOL/RADIUS Authentication (per IEEE 802.1X) and EAPOL/MKA (again, per IEEE802.1X) for the first key exchange (SAK). Once SAK is exchanged, the OLT and the ONU establish a secure management channel using the Zero-Overhead method. All subsequent key exchanges are carried via OAMPDUs under the already encrypted management channel. Using OAMPDUs allows the same messages to be used for multicast and unicast key exchanges, and even allows the same OAMPDU to carry multiple keys (one unicast key per ONU and multiple multicast keys - one for each multicast LLID configured in a given ONU). Now, we seem to be back at the same discussion again. It is unfortunate if for 1.5 months the group members had different assumptions, but good that it surfaced now rather than later. I feel before proceeding further with any technical development, we need to make a formal decision on what encryption method to use. All, Before we attempt to take a vote, let’s make sure we consider all relevant technical arguments. Please reply to this email with your pros and cons for both of these two methods. I will aggregate it all in one document and then we will discuss and take a take a vote, probably at the next WG call. Thank you, Glen From: Marek Hajduczenia <mxhaj79@xxxxxxxxx> Glen, I am not aware of any security incidents for 10G-EPON, but I have limited visibility into NA deployments only. I believe that the concern with zero encryption that led us towards MACSec was the fact that we do not have any spec to fall back on this in case, and would have to write everything ourselves. I am not a fan of MACSec, especially in the upstream direction, where packet sizes are smaller and overhead will be higher. I do like the fact that MACSec solution has a larger security expert forum vetting the system and keeping it up to date. Regards Marek On 3/24/23 15:32, Glen Kramer wrote:
To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1 |