![Page 1: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/1.jpg)
1
Security Framework for MPLS-TP
draft-fang-mpls-tp-security-framework-01.txt
Luyuan [email protected] Niven-Jenkins
March 25, 201077 IETF, Anaheim
![Page 2: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/2.jpg)
2
Brief Review: Objectives and Scope• Objectives:
– Identify and address MPLS-TP specific security issues. • Provide MPLS-TP security requirements• Define MPLS-TP security reference models• Identify MPLS-TP security threats• Discuss MPLS-TP security threat mitigation, recommendations
• Intended category: Informational• Scope:
– In scope: Directly related with MPLS-TP– Out of scope:
• Any functions/application not specific to MPLS-TP. e.g. General MPLS/GMPLS Security, General IP/Internet Security best practice..
– Other drafts for MPLS-TP can point to this draft for general MPLS-TP security discussion, and discuss any specific security issues for the specific protocol proposals as needed.
– Focus is on the inter-connection between trusted and untrusted zones
![Page 3: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/3.jpg)
Pseudowire
PW1
Emulated Service
Native Service(Attachment
Circuit)
T-PE1 T-PE2
Native Service(Attachment
Circuit)
S-PE1CE1 CE2
TP-LSP
PW.Seg t3PW.Seg t1
PW.Seg t2 PW.Seg t4
TP-LSP
MPLS-TP Security Reference Model 1
Model 1: single SP scenarioModel 1a (Not shown): SS-PW within single trusted zone.
Model 1b: MS-PW within single trusted zone (as shown)
Trusted Zone Untrusted ZoneUntrusted Zone
![Page 4: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/4.jpg)
Pseudowire
Emulated Service
Native Service(Attachment
Circuit)
T-PE1 T-PE2
Native Service(Attachment
Circuit)
S-PE1CE1 CE2
TP-LSP
PW1
TP-LSP
MPLS-TP Security Reference Model 2 (b)
Model 2 (b): Single SP, but not all T-PEs are in the Trusted Zone
Trusted Zone Untrusted ZoneUntrusted Zone
S-PE1PW3 PW5
MPLS Core
![Page 5: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/5.jpg)
Pseudowire
Emulated Service
Native Service(Attachment
Circuit)
T-PE1 T-PE2
Native Service(Attachment
Circuit)
S-PE1CE1 CE2
TP-LSP
PW1
TP-LSP
MPLS-TP Security Reference Model 2 (c)
Model 2 (c): Typical Inter-Provider Scenario
Trusted Zone
Untrusted ZoneUntrusted Zone
S-PE1PW3 PW5
![Page 6: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/6.jpg)
Outstanding Security Issues still to be addressed
• Trusted zone boundary definition• Issues
– Spoofing ID– Loopback– NMS – NMS and CP interaction– MIP/MEP assignment and attacks– Topology discovery– Data plane authentication– Label authentication– DoS attack– Performance Monitoring
![Page 7: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/7.jpg)
7
Next Steps
• Clarify Security Trust models– Have we missed anything?
• List additional security requirements/threats/mitigations
• Call for volunteers to provide text for open issues.
![Page 8: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/8.jpg)
Back-up
![Page 9: 1 Security Framework for MPLS-TP draft-fang-mpls-tp-security-framework-01.txt Luyuan Fang lufang@cisco.com Ben Niven-Jenkins benjamin.niven-jenkins@bt.com](https://reader035.vdocuments.us/reader035/viewer/2022081908/5697bf8b1a28abf838c8b147/html5/thumbnails/9.jpg)
Pseudowire
PW1
Emulated Service
Native Service(Attachment
Circuit)
T-PE1 T-PE2
Native Service(Attachment
Circuit)
S-PE1CE1 CE2
TP-LSP
PW.Seg t3PW.Seg t1
PW.Seg t2 PW.Seg t4
TP-LSP
MPLS-TP Security Reference Model 2 (a)
Model 2 (a): Inter-Provider Scenario with single S-PE
Trusted Zone Untrusted ZoneUntrusted Zone