[167282] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

=?windows-1252?Q?Re=3A_Someone=92s_Been_Siphoning_Data_Through_a_Huge_S?=

daemon@ATHENA.MIT.EDU (Eugeniu Patrascu)
Fri Dec 6 14:59:49 2013

In-Reply-To: <E457669B-8730-4EF1-8E26-48D04A46D74B@puck.nether.net>
Date: Fri, 6 Dec 2013 21:55:52 +0200
From: Eugeniu Patrascu <eugen@imacandi.net>
To: Jared Mauch <jared@puck.nether.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Dec 6, 2013 at 9:48 PM, Jared Mauch <jared@puck.nether.net> wrote:

>
> On Dec 6, 2013, at 1:39 PM, Brandon Galbraith <brandon.galbraith@gmail.com>
> wrote:
>
> > If your flows are a target, or your data is of an extremely sensitive
> > nature (diplomatic, etc), why aren't you moving those bits over
> > something more private than IP (point to point L2, MPLS)? This doesn't
> > work for the VoIP target mentioned, but foreign ministries should most
> > definitely not be trusting encryption alone.
>
> I will ruin someones weekend here, but:
>
> MPLS != Encryption.  MPLS VPN = "Stick a label before the still
> unencrypted IP packet".
> MPLS doesn't secure your data, you are responsible for keeping it secure
> on the wire.
>
>
It's always interesting to watch someone's expression when they hear that
MPLS VPN, even if it says VPN in the name is not encrypted. Priceless every
time :)

home help back first fref pref prev next nref lref last post