Hi! Antti: I have been monitoring the TICTOC activities for quite some time and I do not recall whether the apparent conflict between PTP TC (Transparent Clock) feature and the IPSEC for securing mobile backhaul. To implement PTP Transparent Clock, a network node needs to be able to identify the PTP packet (e.g., through a Protocol ID) and calculate its residence time. It then need to insert the residence time when the PTP packet exits the node. With IPSEC, PTP packet may not be able to be identified. I believe this issue must have been discussed in the past TICTOC meetings but I must have just overlooked it. Appreciate if you can provide some quick feedback on this very matter. Thanks and best regards, David
David T. Chen, PhD Distinguished Member of Technical Staff Networks Advanced Technologies Enterprise Mobility Solutions and Networks Motorola Inc. +1-847-632-2664 [email protected] ---------------------------------------------------------------------- Message: 1 Date: Wed, 24 Mar 2010 13:48:10 +0200 From: "Pietilainen, Antti (NSN - FI/Espoo)" <[email protected]> Subject: [TICTOC] Security and management of IEEE1588 (PTP) To: <[email protected]> Cc: Greg Dowd <[email protected]> Message-ID: <b5535400d800ae498532700125acf3df023c7...@fiesexc014.nsn-intra.net> Content-Type: text/plain; charset="us-ascii" Hi Greg, I went through your presentations in the TICTOC meeting. The work items are valid. However, I would like to raise discussion of the suitable standards group in the case of telecom profiles of PTP. My viewpoint is a mobile network vendor's. Security Frequency synchronization without on-path support: 3GPP has specified the use of IPSEC for securing mobile backhaul if necessary. PTP can use the same IPSEC tunnels that are set up for the rest of the base station traffic. Thus, no new security methods are needed at least considering mobile backhaul. In the case of time synchronization with on-path support, if security-enabled, all PTP nodes need to authenticate their immediate neighbors in terms of synchronization. On the other hand, the data traffic rather needs end-to-end security, moreover with end-to-end encryption. Therefore, probably a separate security solution is needed for PTP. There is already an experimental annex in PTP, which covers security for PTP in general - i.e. not only for PTP/UDP/IP stack but also PTP/Ethernet stack. The solution has been verified by security experts of NIST. TICTOC should not declare itself as the owner of PTP security unless the timing community requests it. Management ITU-T Q13/SG15 has decided that management is out of scope of the PTP telecom profile for the time being. Telecom vendors have incorporated the management of packet timing into their network management systems. I don't see that the telecom companies have done a mistake in standards work that needs to be corrected by TICTOC. Surely it is possible to raise the management issue again in Q13 if needed. Conclusion I propose that the possible security & management work carried out in TICTOC would not concern telecom usage of PTP unless IETF and ITU decide together to do otherwise. Best regards, Antti Antti Pietilainen Nokia Siemens Networks Mobile transport research Linnoitustie 6 02600 ESPOO Finland tel. +358-71-8036660 ------------------------------ _______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc End of TICTOC Digest, Vol 40, Issue 4 ************************************* _______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
