Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Thank you, Marek and JC for the additional feedback. I have collected your comments together with what I could gather from reading the 802.1X spec into the attached presentation. I would like to discuss this on our next consensus call.  What I have in this document is based on my, admittedly incomplete, understanding of the MACsec spec. If you find any wrong conclusions in the slides, please let me know whether I should remove them or modify.  Curtis, could you please schedule another consensus call? The WG meeting is scheduled for the April 18th. I guess the good day for the consensus call would be April 4th if most people are available.  Thank you, Glen  From: Marion, Jc <000020b191edabf4-dmarc-request@xxxxxxxxxxxxxxxxx>  All,  From a technical standpoint, I am too ignorant to see a security difference between the 2 and too wise to claim otherwise.  When it comes to the cost of implementation, I donâ??t have any preference as any new next gen product will likely have to support for MACSec and Zero-Overhead anyway because of backward compatibility requirements.  The one place where I see a difference is about performance and competitiveness. Having no overhead cost is definitely advantageous.  Thanks,  Jc  From: stds-1904-4-tf@xxxxxxxxxxxxxxxxx <stds-1904-4-tf@xxxxxxxxxxxxxxxxx> on behalf of Glen Kramer <000006d1020766de-dmarc-request@xxxxxxxxxxxxxxxxx> Hi Marek,  This is a strange turn of events. When we first discussed the MACSec vs. Zero-Overhead in January, I believe you made a comment that 5% of extra overhead is significant enough to prefer the Zero-Overhead method (Sorry if I misunderstood what you said). I believe Mark made a similar comment too. At the same time, no specific technical issues were identified with zero-overhead method and there werenâ??t any strong objections to it besides the concerns of its future post-quantum cipher-agility.  So, I assumed that we had an informal agreement to proceed with the Zero-overhead method and I reiterated that understanding before I presented my slides at the last consensus call. To be clear, the latest proposal relies on the EAPOL/RADIUS Authentication (per IEEE 802.1X) and EAPOL/MKA (again, per IEEE802.1X) for the first key exchange (SAK). Once SAK is exchanged, the OLT and the ONU establish a secure management channel using the Zero-Overhead method. All subsequent key exchanges are carried via OAMPDUs under the already encrypted management channel. Using OAMPDUs allows the same messages to be used for multicast and unicast key exchanges, and even allows the same OAMPDU to carry multiple keys (one unicast key per ONU and multiple multicast keys - one for each multicast LLID configured in a given ONU).  Now, we seem to be back at the same discussion again. It is unfortunate if for 1.5 months the group members had different assumptions, but good that it surfaced now rather than later. I feel before proceeding further with any technical development, we need to make a formal decision on what encryption method to use.  All, Before we attempt to take a vote, letâ??s make sure we consider all relevant technical arguments. Please reply to this email with your pros and cons for both of these two methods. I will aggregate it all in one document and then we will discuss and take a take a vote, probably at the next WG call.   Thank you, Glen   From: Marek Hajduczenia <mxhaj79@xxxxxxxxx>  Glen, I am not aware of any security incidents for 10G-EPON, but I have limited visibility into NA deployments only. I believe that the concern with zero encryption that led us towards MACSec was the fact that we do not have any spec to fall back on this in case, and would have to write everything ourselves. I am not a fan of MACSec, especially in the upstream direction, where packet sizes are smaller and overhead will be higher. I do like the fact that MACSec solution has a larger security expert forum vetting the system and keeping it up to date. Regards Marek On 3/24/23 15:32, Glen Kramer wrote:
To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1 To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1 To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1 |
Attachment:
tf4_2303_kramer_2a_encryption_method.pdf
Description: Adobe PDF document
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature