1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
|
Network Working Group T. Li
Request for Comments: 5304 Redback Networks, Inc.
Obsoletes: 3567 R. Atkinson
Updates: 1195 Extreme Networks, Inc.
Category: Standards Track October 2008
IS-IS Cryptographic Authentication
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
This document describes the authentication of Intermediate System to
Intermediate System (IS-IS) Protocol Data Units (PDUs) using the
Hashed Message Authentication Codes - Message Digest 5 (HMAC-MD5)
algorithm as found in RFC 2104. IS-IS is specified in International
Standards Organization (ISO) 10589, with extensions to support
Internet Protocol version 4 (IPv4) described in RFC 1195. The base
specification includes an authentication mechanism that allows for
multiple authentication algorithms. The base specification only
specifies the algorithm for cleartext passwords. This document
replaces RFC 3567.
This document proposes an extension to that specification that allows
the use of the HMAC-MD5 authentication algorithm to be used in
conjunction with the existing authentication mechanisms.
Li & Atkinson Standards Track [Page 1]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Authentication Procedures . . . . . . . . . . . . . . . . . . . 3
2.1. Implementation Considerations . . . . . . . . . . . . . . . 5
3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
3.1. Security Limitations . . . . . . . . . . . . . . . . . . . 5
3.2. Assurance . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3. Key Configuration . . . . . . . . . . . . . . . . . . . . . 6
3.4. Other Considerations . . . . . . . . . . . . . . . . . . . 7
3.5. Future Directions . . . . . . . . . . . . . . . . . . . . . 7
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 8
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
6.1. Normative References . . . . . . . . . . . . . . . . . . . 8
6.2. Informative References . . . . . . . . . . . . . . . . . . 9
Li & Atkinson Standards Track [Page 2]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
1. Introduction
The IS-IS protocol, as specified in [ISO-10589], provides for the
authentication of Link State Protocol Data Units (LSPs) through the
inclusion of authentication information as part of the LSP. This
authentication information is encoded as a Type-Length-Value (TLV)
tuple. The use of IS-IS for IPv4 networks is described in [RFC1195].
The type of the TLV is specified as 10. The length of the TLV is
variable. The value of the TLV depends on the authentication
algorithm and related secrets being used. The first octet of the
value is used to specify the authentication type. Type 0 is
reserved, type 1 indicates a cleartext password, and type 255 is used
for routing domain private authentication methods. The remainder of
the TLV value is known as the Authentication Value.
This document extends the above situation by allocating a new
authentication type for HMAC-MD5 and specifying the algorithms for
the computation of the Authentication Value. This document also
describes modifications to the base protocol to ensure that the
authentication mechanisms described in this document are effective.
This document is a publication of the IS-IS Working Group within the
IETF. This document replaces [RFC3567], which is an Informational
RFC. This document is on the Standards Track. This document has
revised Section 3, with the significant addition of a discussion of
recent attacks on MD5 in Section 3.2. This document has also added a
substantive "IANA Considerations" section to create a missing
codepoint registry.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Authentication Procedures
The authentication type used for HMAC-MD5 is 54 (0x36). The length
of the Authentication Value for HMAC-MD5 is 16, and the length field
in the TLV is 17.
The HMAC-MD5 algorithm requires a key K and text T as input
[RFC2104]. The key K is the password for the PDU type, as specified
in ISO 10589. The text T is the IS-IS PDU to be authenticated with
the Authentication Value field (inside of the Authentication
Information TLV) set to zero. Note that the Authentication Type is
set to 54 and the length of the TLV is set to 17 before
authentication is computed. When LSPs are authenticated, the
Li & Atkinson Standards Track [Page 3]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
Checksum and Remaining Lifetime fields are set to zero (0) before
authentication is computed. The result of the algorithm is placed in
the Authentication Value field.
When calculating the HMAC-MD5 result for Sequence Number PDUs, Level
1 Sequence Number PDUs SHALL use the Area Authentication string as in
Level 1 Link State PDUs. Level 2 Sequence Number PDUs SHALL use the
domain authentication string as in Level 2 Link State PDUs. IS-IS
Hello PDUs SHALL use the Link Level Authentication String, which MAY
be different from that of Link State PDUs. The HMAC-MD5 result for
the IS-IS Hello PDUs SHALL be calculated after the packet is padded
to the MTU size, if padding is not disabled. Implementations that
support the optional checksum for the Sequence Number PDUs and IS-IS
Hello PDUs MUST NOT include the Checksum TLV.
To authenticate an incoming PDU, a system should save the values of
the Authentication Value field, the Checksum field, and the Remaining
Lifetime field, set these fields to zero, compute authentication, and
then restore the values of these fields.
An implementation that implements HMAC-MD5 authentication and
receives HMAC-MD5 Authentication Information MUST discard the PDU if
the Authentication Value is incorrect.
An implementation MAY have a transition mode where it includes HMAC-
MD5 Authentication Information in PDUs but does not verify the HMAC-
MD5 Authentication Information. This is a transition aid for
networks in the process of deploying authentication.
An implementation MAY check a set of passwords when verifying the
Authentication Value. This provides a mechanism for incrementally
changing passwords in a network.
An implementation that does not implement HMAC-MD5 authentication MAY
accept a PDU that contains the HMAC-MD5 Authentication Type. ISes
(routers) that implement HMAC-MD5 authentication and initiate LSP
purges MUST remove the body of the LSP and add the authentication
TLV. ISes implementing HMAC-MD5 authentication MUST NOT accept
unauthenticated purges. ISes MUST NOT accept purges that contain
TLVs other than the authentication TLV. These restrictions are
necessary to prevent a hostile system from receiving an LSP, setting
the Remaining Lifetime field to zero, and flooding it, thereby
initiating a purge without knowing the authentication password.
Li & Atkinson Standards Track [Page 4]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
2.1. Implementation Considerations
There is an implementation issue that occurs just after password
rollover on an IS-IS router and that might benefit from additional
commentary. Immediately after password rollover on the router, the
router or IS-IS process may restart. If this happens, this causes
the LSP Sequence Number to restart from the value 1 using the new
password. However, neighbors will reject those new LSPs because the
Sequence Number is smaller. The router cannot increase its own LSP
Sequence Number because it fails to authenticate its own old LSP that
neighbors keep sending to it. So the router cannot update its LSP
Sequence Number to its neighbors until all the neighbors time out all
of the original LSPs. One possible solution to this problem is for
the IS-IS process to detect if any inbound LSP with an authentication
failure has the local System ID and also has a higher Sequence Number
than the IS-IS process has. In this event, the IS-IS process SHOULD
increase its own LSP Sequence Number accordingly and re-flood the
LSPs. However, as this scenario could also be triggered by an active
attack by an adversary, it is recommended that a counter be kept on
this case to mitigate the risk from such an attack.
3. Security Considerations
This document enhances the security of the IS-IS routing protocol.
Because a routing protocol contains information that need not be kept
secret, privacy is not a requirement. However, authentication of the
messages within the protocol is of interest in order to reduce the
risk of an adversary compromising the routing system by deliberately
injecting false information into that system.
3.1. Security Limitations
The technology in this document provides an authentication mechanism
for IS-IS. The mechanism described here is not perfect and does not
need to be perfect. Instead, this mechanism represents a significant
increase in the work function of an adversary attacking the IS-IS
protocol, while not causing undue implementation, deployment, or
operational complexity. It provides improved security against
passive attacks, as defined in [RFC1704], when compared to cleartext
password authentication.
This mechanism does not prevent replay attacks; however, in most
cases, such attacks would trigger existing mechanisms in the IS-IS
protocol that would effectively reject old information. Denial-of-
service attacks are not generally preventable in a useful networking
protocol [DoS].
Li & Atkinson Standards Track [Page 5]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
The mechanisms in this document do not provide protection against
compromised, malfunctioning, or misconfigured routers. Such routers
can, either accidentally or deliberately, cause malfunctions that
affect the whole routing domain. The reader is encouraged to consult
[RFC4593] for a more comprehensive description of threats to routing
protocols.
3.2. Assurance
Users need to understand that the quality of the security provided by
this mechanism depends completely on the strength of the implemented
authentication algorithms, the strength of the key being used, and
the correct implementation of the security mechanism in all
communicating IS-IS implementations. This mechanism also depends on
the IS-IS Authentication Key being kept confidential by all parties.
If any of these are incorrect or insufficiently secure, then no real
security will be provided to the users of this mechanism.
Since Dobbertin's attacks on MD5 [Dobb96a] [Dobb96b] [Dobb98] were
first published a dozen years ago, there have been growing concerns
about the effectiveness of the compression function within MD5. More
recent work by Wang and Yu [WY05] accentuates these concerns.
However, despite these research results, there are no published
attacks at present on either Keyed-MD5 or HMAC-MD5. A recent paper
by Bellare [Bell06a] [Bell06b] provides new proofs for the security
of HMAC that require fewer assumptions than previous published proofs
for HMAC. Those proofs indicate that the published issues with MD5
(and separately with SHA-1) do not create an attack on HMAC-MD5 (or
HMAC SHA-1). Most recently, Fouque and others [FLN07] have published
new attacks on NMAC-MD4, HMAC-MD4, and NMAC-MD5. However, their
attacks are non-trivial computationally, and they have not found an
equivalent attack on HMAC-MD5. So, despite the published issues with
the MD5 algorithm, there is currently no published attack that
applies to HMAC-MD5 as used in this IS-IS specification. As with any
cryptographic technique, there is the possibility of the discovery of
future attacks against this mechanism.
3.3. Key Configuration
It should be noted that the key configuration mechanism of routers
may restrict the possible keys that may be used between peers. It is
strongly recommended that an implementation be able to support, at
minimum, a key composed of a string of printable ASCII of 80 bytes or
less, as this is current practice.
Li & Atkinson Standards Track [Page 6]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
3.4. Other Considerations
Changes to the authentication mechanism described here (primarily: to
add a Key-ID field such as that of OSPFv2 and RIPv2) were considered
at some length, but ultimately were rejected. The mechanism here was
already widely implemented in 1999. As of this writing, this
mechanism is fairly widely deployed within the users interested in
cryptographic authentication of IS-IS. The improvement provided by
the proposed revised mechanism was not large enough to justify the
change, given the installed base and lack of operator interest in
deploying a revised mechanism.
If and when a key management protocol appears that is both widely
implemented and easily deployed to secure routing protocols such as
IS-IS, a different authentication mechanism that is designed for use
with that key management schema could be added if desired.
3.5. Future Directions
If a stronger authentication were believed to be required, then the
use of a full digital signature [RFC2154] would be an approach that
should be seriously considered. It was rejected for this purpose at
this time because the computational burden of full digital signatures
is believed to be much higher than is reasonable, given the current
threat environment in operational commercial networks.
If and when additional authentication mechanisms are defined (for
example, to provide a cryptographically stronger hash function), it
will also be necessary to define mechanisms that allow graceful
transition from the existing mechanisms (as defined in this document)
to any future mechanism.
4. IANA Considerations
IANA has created a new codepoint registry to administer the
Authentication Type codepoints for TLV 10. This registry is part of
the existing IS-IS codepoints registry as established by [RFC3563]
and [RFC3359]. This registry is managed using the Designated Expert
policy as described in [RFC5226] and is called "IS-IS Authentication
Type Codes for TLV 10".
The values in the "IS-IS Authentication Type Codes for TLV 10"
registry should be recorded in decimal and should only be approved
after a designated expert, appointed by the IESG area director, has
been consulted. The intention is that any allocation will be
accompanied by a published RFC. However, the designated expert can
approve allocations once it seems clear that an RFC will be
published, allowing for the allocation of values prior to the
Li & Atkinson Standards Track [Page 7]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
document being approved for publication as an RFC. New items should
be documented in a publicly and freely available specification. We
should also allow external specifications to allocate and use the
IS-IS Authentication Type Codes maintained by this registry.
Initial values for the "IS-IS Authentication Type Codes for TLV 10"
registry are given below; future assignments are to be made through
Expert Review. Assignments consist of an authentication type name
and its associated value.
+---------------------------------------------+-------+-------------+
| Authentication Type Code | Value | Reference |
+---------------------------------------------+-------+-------------+
| Reserved | 0 | [ISO-10589] |
| Cleartext Password | 1 | [ISO-10589] |
| ISO 10589 Reserved | 2 | [ISO-10589] |
| HMAC-MD5 Authentication | 54 | RFC 5304 |
| Routeing Domain private authentication | 255 | [ISO-10589] |
| method | | |
+---------------------------------------------+-------+-------------+
5. Acknowledgements
The authors would like to thank (in alphabetical order) Stephen
Farrell, Dave Katz, Steven Luong, Tony Przygienda, Nai-Ming Shen, and
Henk Smit for their comments and suggestions on this document.
6. References
6.1. Normative References
[ISO-10589] ISO, "Intermediate System to Intermediate System intra-
domain routeing information exchange protocol for use in
conjunction with the protocol for providing the
connectionless-mode network service (ISO 8473)",
International Standard 10589:2002, Second Edition, 2002.
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
Hashing for Message Authentication", RFC 2104,
February 1997.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Li & Atkinson Standards Track [Page 8]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
6.2. Informative References
[Bell06a] Bellare, M., "New Proofs for NMAC and HMAC: Security
without Collision-Resistance", Preliminary Version, in
Proceedings of Crypto 2006, Lecture Notes in Computer
Science, Vol. 4117, August 2006.
[Bell06b] Bellare, M., "New Proofs for NMAC and HMAC: Security
without Collision-Resistance", August 2006, <http://
www-cse.ucsd.edu/users/mihir/papers/hmac-new.html>.
[DoS] Voydock, V. and S. Kent, "Security Mechanisms in High-
level Networks", ACM Computing Surveys Vol. 15, No. 2,
June 1983.
[Dobb96a] Dobbertin, H., "Cryptanalysis of MD5 Compress",
EuroCrypt Rump Session 1996, May 1996.
[Dobb96b] Dobbertin, H., "The Status of MD5 After a Recent
Attack", CryptoBytes, Vol. 2, No. 2, 1996.
[Dobb98] Dobbertin, H., "Cryptanalysis of MD4", Journal of
Cryptology, Vol. 11, No. 4, 1998.
[FLN07] Fouque, P., Leurent, G., and P. Nguyen, "Full Key-
Recovery Attacks on HMAC/NMAC-MD5 and NMAC-MD5",
Proceedings of Crypto 2007, August 2007.
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, December 1990.
[RFC1704] Haller, N. and R. Atkinson, "On Internet
Authentication", RFC 1704, October 1994.
[RFC2154] Murphy, S., Badger, M., and B. Wellington, "OSPF with
Digital Signatures", RFC 2154, June 1997.
[RFC3359] Przygienda, T., "Reserved Type, Length and Value (TLV)
Codepoints in Intermediate System to Intermediate
System", RFC 3359, August 2002.
[RFC3563] Zinin, A., "Cooperative Agreement Between the ISOC/IETF
and ISO/IEC Joint Technical Committee 1/Sub Committee 6
(JTC1/SC6) on IS-IS Routing Protocol Development",
RFC 3563, July 2003.
Li & Atkinson Standards Track [Page 9]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
[RFC3567] Li, T. and R. Atkinson, "Intermediate System to
Intermediate System (IS-IS) Cryptographic
Authentication", RFC 3567, July 2003.
[RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
Routing Protocols", RFC 4593, October 2006.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[WY05] Wang, X. and H. Yu, "How to Break MD5 and Other Hash
Functions", Proceedings of EuroCrypt 2005, Lecture Notes
in Computer Science, Vol. 3494, 2005.
Authors' Addresses
Tony Li
Redback Networks, Inc.
300 Holger Way
San Jose, CA 95134
USA
Phone: +1 408 750 5160
EMail: tony.li@tony.li
R. Atkinson
Extreme Networks, Inc.
3585 Monroe St.
Santa Clara, CA 95051
USA
Phone: +1 408 579 2800
EMail: rja@extremenetworks.com
Li & Atkinson Standards Track [Page 10]
^L
RFC 5304 IS-IS Cryptographic Authentication October 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Li & Atkinson Standards Track [Page 11]
^L
|