Hi Danny,
        In particular, the issue has come up in the femtocell standards
where the device is installed in a customer premise and backhauled over
the customer broadband link.  In that scenario, there is definitely a
requirement to implement IPSec for the bearer traffic.  The devices
connect back to the operator network via a security gateway.  So, if the
PTP traffic is coming from inside the operator network, there "could" be
a requirement to run it through the IPSec tunnel already allocated by
the femtocell when it attached to the gateway.  There also appears to be
language that allows some "services" to run in clearchannel but then you
obviously need another address and traceability schema.  So there is not
a clear requirement for this functionality but it is something we are
anticipating could come up and we want to understand the ramifications
and alternatives.  

-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf
Of Danny Mayer
Sent: Tuesday, July 27, 2010 2:15 PM
To: [email protected]
Subject: [TICTOC] Encrypting timing packets

The subject of encrypting PTP (or NTP for that matter) packets came up
during the Working Group Meeting. However, noone has said why you would
bother to do so. The data is not private in any sense of
confidentiality; it's not useful if it's not consumed immediately on
arrival and there's lots of overhead in encrypting and decrypting
packets so why is even being considered. Is there a good use case for
this or are we just wasting cycles?

Danny
_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc
_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to