[55922] in North American Network Operators' Group
RE: VoIP over IPsec
daemon@ATHENA.MIT.EDU (Charles Youse)
Mon Feb 17 13:34:45 2003
Date: Mon, 17 Feb 2003 13:34:13 -0500
From: "Charles Youse" <cyouse@register.com>
To: "Stephen Sprunk" <stephen@sprunk.org>,
"Charlie Clemmer" <cclemmer@nexgennetworks.com>
Cc: <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu
So do you suppose that in my scenario, I'd be better off leaving the =
VoIP out of the encrypted tunnels and use a separate [cleartext] path =
for them?
I'm worried about the security implications, not because I feel there is =
a huge security risk but because I'm sure the topic will be brought up. =
(Communicating over one provider's backbone provides little opportunity =
for third parties to snoop packets between points, of course.) =20
Has the issue of VoIP security ever been addressed? I suppose I should =
really do my homework.
C. =20
-----Original Message-----
From: Stephen Sprunk [mailto:stephen@sprunk.org]
Sent: Monday, February 17, 2003 1:22 PM
To: Charlie Clemmer
Cc: nanog@merit.edu
Subject: Re: VoIP over IPsec
Thus spake "Charlie Clemmer" <cclemmer@nexgennetworks.com>
> Stephen, I know this is outside of Charles' original inquiry, but I'm =
not
> familiar with this "qos pre-classify" feature. Since we would be
encrypting
> voice traffic ... at what point would you classify it? If I classify =
it
> before it goes into the tunnel and gets encrypted, would that
> classification last once it's encrypted? If we try to classify after =
it's
> been encrypted, how can we tell it's voice traffic? It seems to me =
that
> jitter from both the actual encryption process as well as that =
associated
> with basic serialization would be the potential death of VoIP in this
> scenario, but I'm not sure mechanisms available to help resolve that =
risk.
In the default IOS code path, encryption happens before QOS (and after =
GRE).
Modern IOS versions copy the DSCP when encapsulating/ encrypting =
packets, so
DSCP-based QOS will still work, but IP- and port-based QOS will not.
More importantly, encryption is slow; even hardware encryption is
significantly slower than the rest of the forwarding process. It's also
FIFO by default, meaning that large data packets can get stuck ahead of =
your
VoIP packets, causing jitter.
'qos pre-classify' adds a second QOS stage before encryption, which =
allows
you to classify packets in their unencrypted state and, more =
importantly,
adds PQ capability to the encryption stage.
For more information:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/f=
qos
_c/fqcprt1/qcfvpn.htm
S
Stephen Sprunk "God does not play dice." --Albert Einstein
CCIE #3723 "God is an inveterate gambler, and He throws the
K5SSS dice at every possible opportunity." --Stephen Hawking