summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5304.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5304.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5304.txt')
-rw-r--r--doc/rfc/rfc5304.txt619
1 files changed, 619 insertions, 0 deletions
diff --git a/doc/rfc/rfc5304.txt b/doc/rfc/rfc5304.txt
new file mode 100644
index 0000000..cdf373f
--- /dev/null
+++ b/doc/rfc/rfc5304.txt
@@ -0,0 +1,619 @@
+
+
+
+
+
+
+Network Working Group T. Li
+Request for Comments: 5304 Redback Networks, Inc.
+Obsoletes: 3567 R. Atkinson
+Updates: 1195 Extreme Networks, Inc.
+Category: Standards Track October 2008
+
+
+ IS-IS Cryptographic Authentication
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Abstract
+
+ This document describes the authentication of Intermediate System to
+ Intermediate System (IS-IS) Protocol Data Units (PDUs) using the
+ Hashed Message Authentication Codes - Message Digest 5 (HMAC-MD5)
+ algorithm as found in RFC 2104. IS-IS is specified in International
+ Standards Organization (ISO) 10589, with extensions to support
+ Internet Protocol version 4 (IPv4) described in RFC 1195. The base
+ specification includes an authentication mechanism that allows for
+ multiple authentication algorithms. The base specification only
+ specifies the algorithm for cleartext passwords. This document
+ replaces RFC 3567.
+
+ This document proposes an extension to that specification that allows
+ the use of the HMAC-MD5 authentication algorithm to be used in
+ conjunction with the existing authentication mechanisms.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 1]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Authentication Procedures . . . . . . . . . . . . . . . . . . . 3
+ 2.1. Implementation Considerations . . . . . . . . . . . . . . . 5
+ 3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
+ 3.1. Security Limitations . . . . . . . . . . . . . . . . . . . 5
+ 3.2. Assurance . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 3.3. Key Configuration . . . . . . . . . . . . . . . . . . . . . 6
+ 3.4. Other Considerations . . . . . . . . . . . . . . . . . . . 7
+ 3.5. Future Directions . . . . . . . . . . . . . . . . . . . . . 7
+ 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
+ 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 8
+ 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
+ 6.1. Normative References . . . . . . . . . . . . . . . . . . . 8
+ 6.2. Informative References . . . . . . . . . . . . . . . . . . 9
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 2]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+1. Introduction
+
+ The IS-IS protocol, as specified in [ISO-10589], provides for the
+ authentication of Link State Protocol Data Units (LSPs) through the
+ inclusion of authentication information as part of the LSP. This
+ authentication information is encoded as a Type-Length-Value (TLV)
+ tuple. The use of IS-IS for IPv4 networks is described in [RFC1195].
+
+ The type of the TLV is specified as 10. The length of the TLV is
+ variable. The value of the TLV depends on the authentication
+ algorithm and related secrets being used. The first octet of the
+ value is used to specify the authentication type. Type 0 is
+ reserved, type 1 indicates a cleartext password, and type 255 is used
+ for routing domain private authentication methods. The remainder of
+ the TLV value is known as the Authentication Value.
+
+ This document extends the above situation by allocating a new
+ authentication type for HMAC-MD5 and specifying the algorithms for
+ the computation of the Authentication Value. This document also
+ describes modifications to the base protocol to ensure that the
+ authentication mechanisms described in this document are effective.
+
+ This document is a publication of the IS-IS Working Group within the
+ IETF. This document replaces [RFC3567], which is an Informational
+ RFC. This document is on the Standards Track. This document has
+ revised Section 3, with the significant addition of a discussion of
+ recent attacks on MD5 in Section 3.2. This document has also added a
+ substantive "IANA Considerations" section to create a missing
+ codepoint registry.
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+2. Authentication Procedures
+
+ The authentication type used for HMAC-MD5 is 54 (0x36). The length
+ of the Authentication Value for HMAC-MD5 is 16, and the length field
+ in the TLV is 17.
+
+ The HMAC-MD5 algorithm requires a key K and text T as input
+ [RFC2104]. The key K is the password for the PDU type, as specified
+ in ISO 10589. The text T is the IS-IS PDU to be authenticated with
+ the Authentication Value field (inside of the Authentication
+ Information TLV) set to zero. Note that the Authentication Type is
+ set to 54 and the length of the TLV is set to 17 before
+ authentication is computed. When LSPs are authenticated, the
+
+
+
+
+Li & Atkinson Standards Track [Page 3]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+ Checksum and Remaining Lifetime fields are set to zero (0) before
+ authentication is computed. The result of the algorithm is placed in
+ the Authentication Value field.
+
+ When calculating the HMAC-MD5 result for Sequence Number PDUs, Level
+ 1 Sequence Number PDUs SHALL use the Area Authentication string as in
+ Level 1 Link State PDUs. Level 2 Sequence Number PDUs SHALL use the
+ domain authentication string as in Level 2 Link State PDUs. IS-IS
+ Hello PDUs SHALL use the Link Level Authentication String, which MAY
+ be different from that of Link State PDUs. The HMAC-MD5 result for
+ the IS-IS Hello PDUs SHALL be calculated after the packet is padded
+ to the MTU size, if padding is not disabled. Implementations that
+ support the optional checksum for the Sequence Number PDUs and IS-IS
+ Hello PDUs MUST NOT include the Checksum TLV.
+
+ To authenticate an incoming PDU, a system should save the values of
+ the Authentication Value field, the Checksum field, and the Remaining
+ Lifetime field, set these fields to zero, compute authentication, and
+ then restore the values of these fields.
+
+ An implementation that implements HMAC-MD5 authentication and
+ receives HMAC-MD5 Authentication Information MUST discard the PDU if
+ the Authentication Value is incorrect.
+
+ An implementation MAY have a transition mode where it includes HMAC-
+ MD5 Authentication Information in PDUs but does not verify the HMAC-
+ MD5 Authentication Information. This is a transition aid for
+ networks in the process of deploying authentication.
+
+ An implementation MAY check a set of passwords when verifying the
+ Authentication Value. This provides a mechanism for incrementally
+ changing passwords in a network.
+
+ An implementation that does not implement HMAC-MD5 authentication MAY
+ accept a PDU that contains the HMAC-MD5 Authentication Type. ISes
+ (routers) that implement HMAC-MD5 authentication and initiate LSP
+ purges MUST remove the body of the LSP and add the authentication
+ TLV. ISes implementing HMAC-MD5 authentication MUST NOT accept
+ unauthenticated purges. ISes MUST NOT accept purges that contain
+ TLVs other than the authentication TLV. These restrictions are
+ necessary to prevent a hostile system from receiving an LSP, setting
+ the Remaining Lifetime field to zero, and flooding it, thereby
+ initiating a purge without knowing the authentication password.
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 4]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+2.1. Implementation Considerations
+
+ There is an implementation issue that occurs just after password
+ rollover on an IS-IS router and that might benefit from additional
+ commentary. Immediately after password rollover on the router, the
+ router or IS-IS process may restart. If this happens, this causes
+ the LSP Sequence Number to restart from the value 1 using the new
+ password. However, neighbors will reject those new LSPs because the
+ Sequence Number is smaller. The router cannot increase its own LSP
+ Sequence Number because it fails to authenticate its own old LSP that
+ neighbors keep sending to it. So the router cannot update its LSP
+ Sequence Number to its neighbors until all the neighbors time out all
+ of the original LSPs. One possible solution to this problem is for
+ the IS-IS process to detect if any inbound LSP with an authentication
+ failure has the local System ID and also has a higher Sequence Number
+ than the IS-IS process has. In this event, the IS-IS process SHOULD
+ increase its own LSP Sequence Number accordingly and re-flood the
+ LSPs. However, as this scenario could also be triggered by an active
+ attack by an adversary, it is recommended that a counter be kept on
+ this case to mitigate the risk from such an attack.
+
+3. Security Considerations
+
+ This document enhances the security of the IS-IS routing protocol.
+ Because a routing protocol contains information that need not be kept
+ secret, privacy is not a requirement. However, authentication of the
+ messages within the protocol is of interest in order to reduce the
+ risk of an adversary compromising the routing system by deliberately
+ injecting false information into that system.
+
+3.1. Security Limitations
+
+ The technology in this document provides an authentication mechanism
+ for IS-IS. The mechanism described here is not perfect and does not
+ need to be perfect. Instead, this mechanism represents a significant
+ increase in the work function of an adversary attacking the IS-IS
+ protocol, while not causing undue implementation, deployment, or
+ operational complexity. It provides improved security against
+ passive attacks, as defined in [RFC1704], when compared to cleartext
+ password authentication.
+
+ This mechanism does not prevent replay attacks; however, in most
+ cases, such attacks would trigger existing mechanisms in the IS-IS
+ protocol that would effectively reject old information. Denial-of-
+ service attacks are not generally preventable in a useful networking
+ protocol [DoS].
+
+
+
+
+
+Li & Atkinson Standards Track [Page 5]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+ The mechanisms in this document do not provide protection against
+ compromised, malfunctioning, or misconfigured routers. Such routers
+ can, either accidentally or deliberately, cause malfunctions that
+ affect the whole routing domain. The reader is encouraged to consult
+ [RFC4593] for a more comprehensive description of threats to routing
+ protocols.
+
+3.2. Assurance
+
+ Users need to understand that the quality of the security provided by
+ this mechanism depends completely on the strength of the implemented
+ authentication algorithms, the strength of the key being used, and
+ the correct implementation of the security mechanism in all
+ communicating IS-IS implementations. This mechanism also depends on
+ the IS-IS Authentication Key being kept confidential by all parties.
+ If any of these are incorrect or insufficiently secure, then no real
+ security will be provided to the users of this mechanism.
+
+ Since Dobbertin's attacks on MD5 [Dobb96a] [Dobb96b] [Dobb98] were
+ first published a dozen years ago, there have been growing concerns
+ about the effectiveness of the compression function within MD5. More
+ recent work by Wang and Yu [WY05] accentuates these concerns.
+ However, despite these research results, there are no published
+ attacks at present on either Keyed-MD5 or HMAC-MD5. A recent paper
+ by Bellare [Bell06a] [Bell06b] provides new proofs for the security
+ of HMAC that require fewer assumptions than previous published proofs
+ for HMAC. Those proofs indicate that the published issues with MD5
+ (and separately with SHA-1) do not create an attack on HMAC-MD5 (or
+ HMAC SHA-1). Most recently, Fouque and others [FLN07] have published
+ new attacks on NMAC-MD4, HMAC-MD4, and NMAC-MD5. However, their
+ attacks are non-trivial computationally, and they have not found an
+ equivalent attack on HMAC-MD5. So, despite the published issues with
+ the MD5 algorithm, there is currently no published attack that
+ applies to HMAC-MD5 as used in this IS-IS specification. As with any
+ cryptographic technique, there is the possibility of the discovery of
+ future attacks against this mechanism.
+
+3.3. Key Configuration
+
+ It should be noted that the key configuration mechanism of routers
+ may restrict the possible keys that may be used between peers. It is
+ strongly recommended that an implementation be able to support, at
+ minimum, a key composed of a string of printable ASCII of 80 bytes or
+ less, as this is current practice.
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 6]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+3.4. Other Considerations
+
+ Changes to the authentication mechanism described here (primarily: to
+ add a Key-ID field such as that of OSPFv2 and RIPv2) were considered
+ at some length, but ultimately were rejected. The mechanism here was
+ already widely implemented in 1999. As of this writing, this
+ mechanism is fairly widely deployed within the users interested in
+ cryptographic authentication of IS-IS. The improvement provided by
+ the proposed revised mechanism was not large enough to justify the
+ change, given the installed base and lack of operator interest in
+ deploying a revised mechanism.
+
+ If and when a key management protocol appears that is both widely
+ implemented and easily deployed to secure routing protocols such as
+ IS-IS, a different authentication mechanism that is designed for use
+ with that key management schema could be added if desired.
+
+3.5. Future Directions
+
+ If a stronger authentication were believed to be required, then the
+ use of a full digital signature [RFC2154] would be an approach that
+ should be seriously considered. It was rejected for this purpose at
+ this time because the computational burden of full digital signatures
+ is believed to be much higher than is reasonable, given the current
+ threat environment in operational commercial networks.
+
+ If and when additional authentication mechanisms are defined (for
+ example, to provide a cryptographically stronger hash function), it
+ will also be necessary to define mechanisms that allow graceful
+ transition from the existing mechanisms (as defined in this document)
+ to any future mechanism.
+
+4. IANA Considerations
+
+ IANA has created a new codepoint registry to administer the
+ Authentication Type codepoints for TLV 10. This registry is part of
+ the existing IS-IS codepoints registry as established by [RFC3563]
+ and [RFC3359]. This registry is managed using the Designated Expert
+ policy as described in [RFC5226] and is called "IS-IS Authentication
+ Type Codes for TLV 10".
+
+ The values in the "IS-IS Authentication Type Codes for TLV 10"
+ registry should be recorded in decimal and should only be approved
+ after a designated expert, appointed by the IESG area director, has
+ been consulted. The intention is that any allocation will be
+ accompanied by a published RFC. However, the designated expert can
+ approve allocations once it seems clear that an RFC will be
+ published, allowing for the allocation of values prior to the
+
+
+
+Li & Atkinson Standards Track [Page 7]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+ document being approved for publication as an RFC. New items should
+ be documented in a publicly and freely available specification. We
+ should also allow external specifications to allocate and use the
+ IS-IS Authentication Type Codes maintained by this registry.
+
+ Initial values for the "IS-IS Authentication Type Codes for TLV 10"
+ registry are given below; future assignments are to be made through
+ Expert Review. Assignments consist of an authentication type name
+ and its associated value.
+
+ +---------------------------------------------+-------+-------------+
+ | Authentication Type Code | Value | Reference |
+ +---------------------------------------------+-------+-------------+
+ | Reserved | 0 | [ISO-10589] |
+ | Cleartext Password | 1 | [ISO-10589] |
+ | ISO 10589 Reserved | 2 | [ISO-10589] |
+ | HMAC-MD5 Authentication | 54 | RFC 5304 |
+ | Routeing Domain private authentication | 255 | [ISO-10589] |
+ | method | | |
+ +---------------------------------------------+-------+-------------+
+
+5. Acknowledgements
+
+ The authors would like to thank (in alphabetical order) Stephen
+ Farrell, Dave Katz, Steven Luong, Tony Przygienda, Nai-Ming Shen, and
+ Henk Smit for their comments and suggestions on this document.
+
+6. References
+
+6.1. Normative References
+
+ [ISO-10589] ISO, "Intermediate System to Intermediate System intra-
+ domain routeing information exchange protocol for use in
+ conjunction with the protocol for providing the
+ connectionless-mode network service (ISO 8473)",
+ International Standard 10589:2002, Second Edition, 2002.
+
+ [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
+ Hashing for Message Authentication", RFC 2104,
+ February 1997.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 8]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+6.2. Informative References
+
+ [Bell06a] Bellare, M., "New Proofs for NMAC and HMAC: Security
+ without Collision-Resistance", Preliminary Version, in
+ Proceedings of Crypto 2006, Lecture Notes in Computer
+ Science, Vol. 4117, August 2006.
+
+ [Bell06b] Bellare, M., "New Proofs for NMAC and HMAC: Security
+ without Collision-Resistance", August 2006, <http://
+ www-cse.ucsd.edu/users/mihir/papers/hmac-new.html>.
+
+ [DoS] Voydock, V. and S. Kent, "Security Mechanisms in High-
+ level Networks", ACM Computing Surveys Vol. 15, No. 2,
+ June 1983.
+
+ [Dobb96a] Dobbertin, H., "Cryptanalysis of MD5 Compress",
+ EuroCrypt Rump Session 1996, May 1996.
+
+ [Dobb96b] Dobbertin, H., "The Status of MD5 After a Recent
+ Attack", CryptoBytes, Vol. 2, No. 2, 1996.
+
+ [Dobb98] Dobbertin, H., "Cryptanalysis of MD4", Journal of
+ Cryptology, Vol. 11, No. 4, 1998.
+
+ [FLN07] Fouque, P., Leurent, G., and P. Nguyen, "Full Key-
+ Recovery Attacks on HMAC/NMAC-MD5 and NMAC-MD5",
+ Proceedings of Crypto 2007, August 2007.
+
+ [RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
+ dual environments", RFC 1195, December 1990.
+
+ [RFC1704] Haller, N. and R. Atkinson, "On Internet
+ Authentication", RFC 1704, October 1994.
+
+ [RFC2154] Murphy, S., Badger, M., and B. Wellington, "OSPF with
+ Digital Signatures", RFC 2154, June 1997.
+
+ [RFC3359] Przygienda, T., "Reserved Type, Length and Value (TLV)
+ Codepoints in Intermediate System to Intermediate
+ System", RFC 3359, August 2002.
+
+ [RFC3563] Zinin, A., "Cooperative Agreement Between the ISOC/IETF
+ and ISO/IEC Joint Technical Committee 1/Sub Committee 6
+ (JTC1/SC6) on IS-IS Routing Protocol Development",
+ RFC 3563, July 2003.
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 9]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+ [RFC3567] Li, T. and R. Atkinson, "Intermediate System to
+ Intermediate System (IS-IS) Cryptographic
+ Authentication", RFC 3567, July 2003.
+
+ [RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
+ Routing Protocols", RFC 4593, October 2006.
+
+ [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
+ IANA Considerations Section in RFCs", BCP 26, RFC 5226,
+ May 2008.
+
+ [WY05] Wang, X. and H. Yu, "How to Break MD5 and Other Hash
+ Functions", Proceedings of EuroCrypt 2005, Lecture Notes
+ in Computer Science, Vol. 3494, 2005.
+
+Authors' Addresses
+
+ Tony Li
+ Redback Networks, Inc.
+ 300 Holger Way
+ San Jose, CA 95134
+ USA
+
+ Phone: +1 408 750 5160
+ EMail: tony.li@tony.li
+
+
+ R. Atkinson
+ Extreme Networks, Inc.
+ 3585 Monroe St.
+ Santa Clara, CA 95051
+ USA
+
+ Phone: +1 408 579 2800
+ EMail: rja@extremenetworks.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 10]
+
+RFC 5304 IS-IS Cryptographic Authentication October 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Li & Atkinson Standards Track [Page 11]
+