Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: opinions needed for trunk protection



Personal 2 cents, nothing more - I have not seen a live deployment of this feature to date for 1G or 10G PON. It has been spoken about, debated, etc., but getting it deployed is a separate topic altogether.
Given the added complexity when OLT and ONU are mutually authenticated, I'd vote for a feature drop and extraction.
We *could* go the route of how SAE is implemented in WPA3 in the wireless world but it will just add complexity to an already complex and unused feature of the PON systems.
Marek

On Wed, Oct 23, 2024 at 6:43 PM Glen Kramer <000006d1020766de-dmarc-request@xxxxxxxxxxxxxxxxx> wrote:

Hi All,

 

I was reviewing the Trunk Protection section and found that assumptions made in 1904.1 and carried over into 1904.4 may not hold anymore.

I’d like to get some feedback on my question below. To remind you, here is a drawing of trunk-protected PON:

 

The two OLTs can be in different central offices and the fiber length would be very different for the primary and backup trunks. The 1904.1 assumed that the backup OLT derives or is given the RTTs for all working ONUs and when the primary OLT or trunk fails, the backup OLT can just take over and start granting all registered ONUs.

 

 

The problem I see for 1904.4 is that now we have mandatory authentication and encryption. Is it reasonable to assume that the backup OLT can access ONU’s authentication and encryption data, including the encryption keys that exist within the primary OLT?

 

I don’t think this is feasible without creating major security problems.

If authentication data and keys are not available to the backup OLT, then the protection switching event should be followed by these steps:

 

1)  ONU and OLT stop sending all user data

2)  Synchronize MPCP clocks at the ONUs based on backup OLT MPCP clock

3)  Synchronize CipherClocks at the ONUs (for IV derivation)

4)  Re-authenticate all ONUs

5)  Derive the initial keys for every ONU.

6)  Start symmetric encryption (AES256)

7)  Enable user data

 

I don’t think we can avoid most of the steps of a normal ONU startup sequence shown below. Maybe we can avoid steps 1 and 6, if the backup OLT gets ONUs IDs and RTTs externally and the ONU preserves the configuration during the HOLDOVER period.

 

 

 

Thank you,

Glen


To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1


To unsubscribe from the STDS-1904-4-TF list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-1904-4-TF&A=1

Attachment: image002.jpg
Description: JPEG image

Attachment: image006.jpg
Description: JPEG image