1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
|
Internet Engineering Task Force (IETF) M. Bhatia
Request for Comments: 7166 Alcatel-Lucent
Obsoletes: 6506 V. Manral
Category: Standards Track Ionos Corp.
ISSN: 2070-1721 A. Lindem
Ericsson
March 2014
Supporting Authentication Trailer for OSPFv3
Abstract
Currently, OSPF for IPv6 (OSPFv3) uses IPsec as the only mechanism
for authenticating protocol packets. This behavior is different from
authentication mechanisms present in other routing protocols (OSPFv2,
Intermediate System to Intermediate System (IS-IS), RIP, and Routing
Information Protocol Next Generation (RIPng)). In some environments,
it has been found that IPsec is difficult to configure and maintain
and thus cannot be used. This document defines an alternative
mechanism to authenticate OSPFv3 protocol packets so that OSPFv3 does
not depend only upon IPsec for authentication.
The OSPFv3 Authentication Trailer was originally defined in RFC 6506.
This document obsoletes RFC 6506 by providing a revised definition,
including clarifications and refinements of the procedures.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7166.
Bhatia, et al. Standards Track [Page 1]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction ....................................................3
1.1. Requirements ...............................................4
1.2. Summary of Changes from RFC 6506 ...........................4
2. Proposed Solution ...............................................5
2.1. AT-Bit in Options Field ....................................5
2.2. Basic Operation ............................................6
2.3. IPv6 Source Address Protection .............................6
3. OSPFv3 Security Association .....................................7
4. Authentication Procedure ........................................9
4.1. Authentication Trailer .....................................9
4.1.1. Sequence Number Wrap ...............................11
4.2. OSPFv3 Header Checksum and LLS Data Block Checksum ........11
4.3. Cryptographic Authentication Procedure ....................12
4.4. Cross-Protocol Attack Mitigation ..........................12
4.5. Cryptographic Aspects .....................................12
4.6. Message Verification ......................................15
5. Migration and Backward Compatibility ...........................16
6. Security Considerations ........................................17
7. IANA Considerations ............................................18
8. References .....................................................19
8.1. Normative References ......................................19
8.2. Informative References ....................................19
Appendix A. Acknowledgments .......................................22
Bhatia, et al. Standards Track [Page 2]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
1. Introduction
Unlike Open Shortest Path First version 2 (OSPFv2) [RFC2328], OSPF
for IPv6 (OSPFv3) [RFC5340] does not include the AuType and
Authentication fields in its headers for authenticating protocol
packets. Instead, OSPFv3 relies on the IPsec protocols
Authentication Header (AH) [RFC4302] and Encapsulating Security
Payload (ESP) [RFC4303] to provide integrity, authentication, and/or
confidentiality.
[RFC4552] describes how IPv6 AH and ESP extension headers can be used
to provide authentication and/or confidentiality to OSPFv3.
However, there are some environments, e.g., Mobile Ad Hoc Networks
(MANETs), where IPsec is difficult to configure and maintain; this
mechanism cannot be used in such environments.
[RFC4552] discusses, at length, the reasoning behind using manually
configured keys, rather than some automated key management protocol
such as Internet Key Exchange version 2 (IKEv2) [RFC5996]. The
primary problem is the lack of a suitable key management mechanism,
as OSPFv3 adjacencies are formed on a one-to-many basis and most key
management mechanisms are designed for a one-to-one communication
model. This forces the system administrator to use manually
configured Security Associations (SAs) and cryptographic keys to
provide the authentication and, if desired, confidentiality services.
Regarding replay protection, [RFC4552] states that:
Since it is not possible using the current standards to provide
complete replay protection while using manual keying, the proposed
solution will not provide protection against replay attacks.
Since there is no replay protection provided, there are a number of
vulnerabilities in OSPFv3 that have been discussed in [RFC6039].
While techniques exist to identify ESP-NULL packets [RFC5879], these
techniques are generally not implemented in the data planes of OSPFv3
routers. This makes it very difficult for implementations to examine
OSPFv3 packets and prioritize certain OSPFv3 packet types, e.g.,
Hello packets, over the other types.
This document defines a mechanism that works similarly to OSPFv2
[RFC5709] to provide authentication to OSPFv3 packets and solves the
problems related to replay protection and deterministically
disambiguating different OSPFv3 packets as described above.
Bhatia, et al. Standards Track [Page 3]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
This document adds support for the Secure Hash Algorithms (SHAs)
defined in the US NIST Secure Hash Standard (SHS), which is specified
by NIST FIPS 180-4. [FIPS-180-4] includes SHA-1, SHA-224, SHA-256,
SHA-384, and SHA-512. The Hashed Message Authentication Code (HMAC)
authentication mode defined in NIST FIPS 198-1 [FIPS-198-1] is used.
1.1. Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1.2. Summary of Changes from RFC 6506
This document includes the following changes from RFC 6506 [RFC6506]:
1. Sections 2.2 and 4.2 explicitly state that the Link-Local
Signaling (LLS) block checksum calculation is omitted when an
OSPFv3 Authentication Trailer is used for OSPFv3 authentication.
The LLS data block is included in the authentication digest
calculation, and computation of a checksum is unnecessary.
Clarification of this issue was documented in an erratum.
2. Section 3 previously recommended usage of an expired key for
transmitted OSPFv3 packets when no valid keys existed. This
statement has been removed.
3. Section 4.5 includes a correction to the key preparation to use
the Protocol-Specific Authentication Key (Ks) rather than the
Authentication Key (K) as the initial key (Ko). This problem was
also documented in an erratum.
4. Section 4.5 also includes a discussion of the choice of key length
to be the hash length (L) rather than the block size (B). The
discussion of this choice was included to clarify an issue raised
in a rejected erratum.
5. Sections 4.1 and 4.6 indicate that sequence number checking is
dependent on OSPFv3 packet type in order to account for packet
prioritization as specified in [RFC4222]. This was an omission
from RFC 6506 [RFC6506].
6. Section 4.6 explicitly states that OSPFv3 packets with a
nonexistent or expired Security Association (SA) will be dropped.
7. Section 5 includes guidance on the precise actions required for an
OSPFv3 router providing a backward-compatible transition mode.
Bhatia, et al. Standards Track [Page 4]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
2. Proposed Solution
To perform non-IPsec Cryptographic Authentication, OSPFv3 routers
append a special data block, henceforth referred to as the
Authentication Trailer, to the end of the OSPFv3 packets. The length
of the Authentication Trailer is not included in the length of the
OSPFv3 packet but is included in the IPv6 payload length, as shown in
Figure 1.
+---------------------+ -- -- +----------------------+
| IPv6 Payload Length | ^ ^ | IPv6 Payload Length |
| PL = OL + LL | | | | PL = OL + LL + AL |
| | v v | |
+---------------------+ -- -- +----------------------+
| OSPFv3 Header | ^ ^ | OSPFv3 Header |
| Length = OL | | | | Length = OL |
| | | OSPFv3 | | |
|.....................| | Packet | |......................|
| | | Length | | |
| OSPFv3 Packet | | | | OSPFv3 Packet |
| | v v | |
+---------------------+ -- -- +----------------------+
| | ^ ^ | |
| Optional LLS | | LLS Data | | Optional LLS |
| LL = LLS Data | | Block | | LL = LLS Data |
| Block Length | v Length v | Block Length |
+---------------------+ -- -- +----------------------+
^ | |
AL = PL - (OL + LL) | | Authentication |
| | AL = Fixed Trailer + |
v | Digest Length |
-- +----------------------+
Figure 1: Authentication Trailer in OSPFv3
The presence of the Link-Local Signaling (LLS) [RFC5613] block is
determined by the L-bit setting in the OSPFv3 Options field in OSPFv3
Hello and Database Description packets. If present, the LLS data
block is included along with the OSPFv3 packet in the Cryptographic
Authentication computation.
2.1. AT-Bit in Options Field
RFC 6506 introduced the AT-bit ("AT" stands for "Authentication
Trailer") into the OSPFv3 Options field. OSPFv3 routers MUST set the
AT-bit in OSPFv3 Hello and Database Description packets to indicate
that all the packets on this link will include an Authentication
Trailer. For OSPFv3 Hello and Database Description packets, the
Bhatia, et al. Standards Track [Page 5]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
AT-bit indicates that the AT is present. For other OSPFv3 packet
types, the OSPFv3 AT-bit setting from the OSPFv3 Hello/Database
Description setting is preserved in the OSPFv3 neighbor data
structure. OSPFv3 packet types that don't include an OSPFv3 Options
field will use the setting from the neighbor data structure to
determine whether or not the AT is expected.
0 1 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
+-+-+-+-+-+-+-+-+-+-+-+-+-+--+-+--+-+-+--+-+-+--+-+--+
| | | | | | | | | | | | | |AT|L|AF|*|*|DC|R|N|MC|E|V6|
+-+-+-+-+-+-+-+-+-+-+-+-+-+--+-+--+-+-+--+-+-+--+-+--+
Figure 2: OSPFv3 Options Field
The AT-bit, as shown in the figure above, MUST be set in all OSPFv3
Hello and Database Description packets that contain an Authentication
Trailer.
2.2. Basic Operation
The procedure followed for computing the Authentication Trailer is
much the same as those described in [RFC5709] and [RFC2328]. One
difference is that the LLS data block, if present, is included in the
Cryptographic Authentication computation.
The way the authentication data is carried in the Authentication
Trailer is very similar to how it is done in the case of [RFC2328].
The only difference between the OSPFv2 Authentication Trailer and the
OSPFv3 Authentication Trailer is that information in addition to the
message digest is included. The additional information in the OSPFv3
Authentication Trailer is included in the message digest computation
and is therefore protected by OSPFv3 Cryptographic Authentication as
described herein.
Consistent with OSPFv2 Cryptographic Authentication [RFC2328] and
Link-Local Signaling Cryptographic Authentication [RFC5613], checksum
calculation and verification are omitted for both the OSPFv3 header
checksum and the LLS data block when the OSPFv3 authentication
mechanism described in this specification is used.
2.3. IPv6 Source Address Protection
While OSPFv3 always uses the Router ID to identify OSPFv3 neighbors,
the IPv6 source address is learned from OSPFv3 Hello packets and
copied into the neighbor data structure [RFC5340]. Hence, OSPFv3 is
susceptible to Man-in-the-Middle attacks where the IPv6 source
address is modified. To thwart such attacks, the IPv6 source address
Bhatia, et al. Standards Track [Page 6]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
will be included in the message digest calculation and protected by
OSPFv3 authentication. Refer to Section 4.5 for details. This is
different than the procedure specified in [RFC5709] but consistent
with [MANUAL-KEY].
3. OSPFv3 Security Association
An OSPFv3 Security Association (SA) contains a set of parameters
shared between any two legitimate OSPFv3 speakers.
Parameters associated with an OSPFv3 SA are as follows:
o Security Association Identifier (SA ID)
This is a 16-bit unsigned integer used to uniquely identify an
OSPFv3 SA, as manually configured by the network operator.
The receiver determines the active SA by looking at the SA ID
field in the incoming protocol packet.
The sender, based on the active configuration, selects an SA to
use and puts the correct Key ID value associated with the SA in
the OSPFv3 protocol packet. If multiple valid and active OSPFv3
SAs exist for a given interface, the sender may use any of those
SAs to protect the packet.
Using SA IDs makes changing keys while maintaining protocol
operation convenient. Each SA ID specifies two independent parts:
the authentication algorithm and the Authentication Key, as
explained below.
Normally, an implementation would allow the network operator to
configure a set of keys in a key chain, with each key in the chain
having a fixed lifetime. The actual operation of these mechanisms
is outside the scope of this document.
Note that each SA ID can indicate a key with a different
authentication algorithm. This allows the introduction of new
authentication mechanisms without disrupting existing OSPFv3
adjacencies.
o Authentication Algorithm
This signifies the authentication algorithm to be used with this
OSPFv3 SA. This information is never sent in clear text over the
wire. Because this information is not sent on the wire, the
implementer chooses an implementation-specific representation for
this information.
Bhatia, et al. Standards Track [Page 7]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Currently, the following algorithms are supported:
* HMAC-SHA-1,
* HMAC-SHA-256,
* HMAC-SHA-384, and
* HMAC-SHA-512.
o Authentication Key
This value denotes the Cryptographic Authentication Key associated
with this OSPFv3 SA. The length of this key is variable and
depends upon the authentication algorithm specified by the
OSPFv3 SA.
o KeyStartAccept
This value indicates the time that this OSPFv3 router will accept
packets that have been created with this OSPFv3 SA.
o KeyStartGenerate
This value indicates the time that this OSPFv3 router will begin
using this OSPFv3 SA for OSPFv3 packet generation.
o KeyStopGenerate
This value indicates the time that this OSPFv3 router will stop
using this OSPFv3 SA for OSPFv3 packet generation.
o KeyStopAccept
This value indicates the time that this OSPFv3 router will stop
accepting packets generated with this OSPFv3 SA.
In order to achieve smooth key transition, KeyStartAccept SHOULD
be less than KeyStartGenerate, and KeyStopGenerate SHOULD be less
than KeyStopAccept. If KeyStartGenerate or KeyStartAccept is left
unspecified, the time will default to 0, and the key will be used
immediately. If KeyStopGenerate or KeyStopAccept is left
unspecified, the time will default to infinity, and the key's
lifetime will be infinite. When a new key replaces an old key,
the KeyStartGenerate time for the new key MUST be less than or
equal to the KeyStopGenerate time of the old key.
Bhatia, et al. Standards Track [Page 8]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Key storage SHOULD persist across a system restart, warm or cold,
to avoid operational issues. In the event that the last key
associated with an interface expires, the network operator SHOULD
be notified, and the OSPFv3 packet MUST NOT be transmitted
unauthenticated.
4. Authentication Procedure
4.1. Authentication Trailer
The Authentication Trailer that is appended to the OSPFv3 protocol
packet is described below:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Type | Auth Data Len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Security Association ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cryptographic Sequence Number (High-Order 32 Bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cryptographic Sequence Number (Low-Order 32 Bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Authentication Data (Variable) |
~ ~
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: Authentication Trailer Format
The various fields in the Authentication Trailer are as follows:
o Authentication Type
This 16-bit field identifies the type of authentication. The
following values are defined in this specification:
0 - Reserved.
1 - HMAC Cryptographic Authentication as described herein.
o Auth Data Len
This is the length in octets of the Authentication Trailer (AT),
including both the 16-octet fixed header and the variable-length
message digest.
Bhatia, et al. Standards Track [Page 9]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
o Reserved
This field is reserved. It SHOULD be set to 0 when sending
protocol packets and MUST be ignored when receiving protocol
packets.
o Security Association Identifier (SA ID)
This 16-bit field maps to the authentication algorithm and the
secret key used to create the message digest appended to the
OSPFv3 protocol packet.
Though the SA ID implies the algorithm, the HMAC output size
should not be used by implementers as an implicit hint, because
additional algorithms may be defined in the future that have the
same output size.
o Cryptographic Sequence Number
This is a 64-bit strictly increasing sequence number that is used
to guard against replay attacks. The 64-bit sequence number MUST
be incremented for every OSPFv3 packet sent by the OSPFv3 router.
Upon reception, the sequence number MUST be greater than the
sequence number in the last accepted OSPFv3 packet of the same
OSPFv3 packet type from the sending OSPFv3 neighbor. Otherwise,
the OSPFv3 packet is considered a replayed packet and dropped.
OSPFv3 packets of different types may arrive out of order if they
are prioritized as recommended in [RFC4222].
OSPFv3 routers implementing this specification MUST use available
mechanisms to preserve the sequence number's strictly increasing
property for the deployed life of the OSPFv3 router (including
cold restarts). One mechanism for accomplishing this would be to
use the high-order 32 bits of the sequence number as a wrap/boot
count that is incremented anytime the OSPFv3 router loses its
sequence number state. Sequence number wrap is described in
Section 4.1.1.
o Authentication Data
This field contains variable data that is carrying the digest for
the protocol packet and optional LLS data block.
Bhatia, et al. Standards Track [Page 10]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
4.1.1. Sequence Number Wrap
When incrementing the sequence number for each transmitted OSPFv3
packet, the sequence number should be treated as an unsigned 64-bit
value. If the lower-order 32-bit value wraps, the higher-order
32-bit value should be incremented and saved in non-volatile storage.
If by some chance the OSPFv3 router is deployed long enough that
there is a possibility that the 64-bit sequence number may wrap, all
keys, independent of their key distribution mechanism, MUST be reset
to avoid the possibility of replay attacks. Once the keys have been
changed, the higher-order sequence number can be reset to 0 and saved
to non-volatile storage.
4.2. OSPFv3 Header Checksum and LLS Data Block Checksum
Both the checksum calculation and verification are omitted for the
OSPFv3 header checksum and the LLS data block checksum [RFC5613] when
the OSPFv3 authentication mechanism described in this specification
is used. This implies the following:
o For OSPFv3 packets to be transmitted, the OSPFv3 header checksum
computation is omitted, and the OSPFv3 header checksum SHOULD be
set to 0 prior to computation of the OSPFv3 Authentication Trailer
message digest.
o For OSPFv3 packets including an LLS data block to be transmitted,
the OSPFv3 LLS data block checksum computation is omitted, and the
OSPFv3 LLS data block checksum SHOULD be set to 0 prior to
computation of the OSPFv3 Authentication Trailer message digest.
o For received OSPFv3 packets including an OSPFv3 Authentication
Trailer, OSPFv3 header checksum verification MUST be omitted.
However, if the OSPFv3 packet does include a non-zero OSPFv3
header checksum, it will not be modified by the receiver and will
simply be included in the OSPFv3 Authentication Trailer message
digest verification.
o For received OSPFv3 packets including an LLS data block and OSPFv3
Authentication Trailer, LLS data block checksum verification MUST
be omitted. However, if the OSPFv3 packet does include an LLS
data block with a non-zero checksum, it will not be modified by
the receiver and will simply be included in the OSPFv3
Authentication Trailer message digest verification.
Bhatia, et al. Standards Track [Page 11]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
4.3. Cryptographic Authentication Procedure
As noted earlier, the SA ID maps to the authentication algorithm and
the secret key used to generate and verify the message digest. This
specification discusses the computation of OSPFv3 Cryptographic
Authentication data when any of the NIST SHS family of algorithms is
used in the Hashed Message Authentication Code (HMAC) mode.
The currently valid algorithms (including mode) for OSPFv3
Cryptographic Authentication include:
o HMAC-SHA-1,
o HMAC-SHA-256,
o HMAC-SHA-384, and
o HMAC-SHA-512.
Of the above, implementations of this specification MUST include
support for at least HMAC-SHA-256 and SHOULD include support for
HMAC-SHA-1 and MAY also include support for HMAC-SHA-384 and
HMAC-SHA-512.
Implementations of this specification MUST use HMAC-SHA-256 as the
default authentication algorithm.
4.4. Cross-Protocol Attack Mitigation
In order to prevent cross-protocol replay attacks for protocols
sharing common keys, the two-octet OSPFv3 Cryptographic Protocol ID
is appended to the Authentication Key prior to use. Other protocols
using Cryptographic Authentication as specified herein MUST similarly
append their respective Cryptographic Protocol IDs to their keys in
this step. Refer to the IANA Considerations (Section 7).
4.5. Cryptographic Aspects
In the algorithm description below, the following nomenclature, which
is consistent with [FIPS-198-1], is used:
H is the specific hashing algorithm (e.g., SHA-256).
K is the Authentication Key from the OSPFv3 Security Association.
Ks is a Protocol-Specific Authentication Key obtained by appending
Authentication Key (K) with the two-octet OSPFv3 Cryptographic
Protocol ID.
Bhatia, et al. Standards Track [Page 12]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Ko is the cryptographic key used with the hash algorithm.
B is the block size of H, measured in octets rather than bits. Note
that B is the internal block size, not the hash size.
For SHA-1 and SHA-256: B == 64
For SHA-384 and SHA-512: B == 128
L is the length of the hash, measured in octets rather than bits.
XOR is the exclusive-or operation.
Opad is the hexadecimal value 0x5c repeated B times.
Ipad is the hexadecimal value 0x36 repeated B times.
Apad is a value that is the same length as the hash output or message
digest. The first 16 octets contain the IPv6 source address followed
by the hexadecimal value 0x878FE1F3 repeated (L-16)/4 times. This
implies that hash output is always a length of at least 16 octets.
1. Preparation of the Key
The OSPFv3 Cryptographic Protocol ID is appended to the
Authentication Key (K), yielding a Protocol-Specific
Authentication Key (Ks). In this application, Ko is always
L octets long. While [RFC2104] supports a key that is up to
B octets long, this application uses L as the Ks length consistent
with [RFC4822], [RFC5310], and [RFC5709]. According to
[FIPS-198-1], Section 3, keys greater than L octets do not
significantly increase the function strength. Ks is computed as
follows:
If Ks is L octets long, then Ko is equal to Ks. If Ks is more
than L octets long, then Ko is set to H(Ks). If Ks is less
than L octets long, then Ko is set to the value of Ks, with
zeros appended to the end of Ks such that Ko is L octets long.
2. First-Hash
First, the OSPFv3 packet's Authentication Data field in the
Authentication Trailer is filled with the value Apad. This is
very similar to the appendage described in [RFC2328],
Appendix D.4.3, Items (6)(a) and (6)(d)).
Bhatia, et al. Standards Track [Page 13]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Then, a First-Hash, also known as the inner hash, is computed as
follows:
First-Hash = H(Ko XOR Ipad || (OSPFv3 Packet))
When XORing Ko and Ipad, Ko will be padded with zeros to the
length of Ipad.
Implementation Note: The First-Hash above includes the
Authentication Trailer as well as the OSPFv3 packet as per
[RFC2328], Appendix D.4.3, and the LLS data block, if present
[RFC5613].
The definition of Apad (above) ensures that it is always the same
length as the hash output. This is consistent with RFC 2328.
Note that the "(OSPFv3 Packet)" referenced in the First-Hash
function above includes both the optional LLS data block and the
OSPFv3 Authentication Trailer.
The digest length for SHA-1 is 20 octets; for SHA-256, 32 octets;
for SHA-384, 48 octets; and for SHA-512, 64 octets.
3. Second-Hash
Then a Second-Hash, also known as the outer hash, is computed as
follows:
Second-Hash = H(Ko XOR Opad || First-Hash)
When XORing Ko and Opad, Ko will be padded with zeros to the
length of Opad.
4. Result
The resulting Second-Hash becomes the authentication data that is
sent in the Authentication Trailer of the OSPFv3 packet. The
length of the authentication data is always identical to the
message digest size of the specific hash function H that is
being used.
This also means that the use of hash functions with larger output
sizes will also increase the size of the OSPFv3 packet as
transmitted on the wire.
Bhatia, et al. Standards Track [Page 14]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Implementation Note: [RFC2328], Appendix D specifies that the
Authentication Trailer is not counted in the OSPF packet's own
Length field but is included in the packet's IP Length field.
Similar to this, the Authentication Trailer is not included in
the OSPFv3 header length but is included in the IPv6 header
payload length.
4.6. Message Verification
A router would determine that OSPFv3 is using an Authentication
Trailer (AT) by examining the AT-bit in the Options field in the
OSPFv3 header for Hello and Database Description packets. The
specification in the Hello and Database Description options indicates
that other OSPFv3 packets will include the Authentication Trailer.
The AT is accessed using the OSPFv3 packet header length to access
the data after the OSPFv3 packet and, if an LLS data block [RFC5613]
is present, using the LLS data block length to access the data after
the LLS data block. The L-bit in the OSPFv3 options in Hello and
Database Description packets is examined to determine if an LLS data
block is present. If an LLS data block is present (as specified by
the L-bit), it is included along with the OSPFv3 Hello or Database
Description packet in the Cryptographic Authentication computation.
Due to the placement of the AT following the LLS data block and the
fact that the LLS data block is included in the Cryptographic
Authentication computation, OSPFv3 routers supporting this
specification MUST minimally support examining the L-bit in the
OSPFv3 options and using the length in the LLS data block to access
the AT. It is RECOMMENDED that OSPFv3 routers supporting this
specification fully support OSPFv3 Link-Local Signaling [RFC5613].
If usage of the AT, as specified herein, is configured for an OSPFv3
link, OSPFv3 Hello and Database Description packets with the AT-bit
clear in the options will be dropped. All OSPFv3 packet types will
be dropped if the AT is configured for the link and the IPv6 header
length is less than the amount necessary to include an Authentication
Trailer.
The receiving interface's OSPFv3 SA is located using the SA ID in the
received AT. If the SA is not found, or if the SA is not valid for
reception (i.e., current time < KeyStartAccept or
current time >= KeyStopAccept), the OSPFv3 packet is dropped.
If the cryptographic sequence number in the AT is less than or equal
to the last sequence number in the last OSPFv3 packet of the same
OSPFv3 type successfully received from the neighbor, the OSPFv3
Bhatia, et al. Standards Track [Page 15]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
packet MUST be dropped, and an error event SHOULD be logged. OSPFv3
packets of different types may arrive out of order if they are
prioritized as recommended in [RFC4222].
Authentication-algorithm-dependent processing needs to be performed,
using the algorithm specified by the appropriate OSPFv3 SA for the
received packet.
Before an implementation performs any processing, it needs to save
the values of the Authentication Data field from the Authentication
Trailer appended to the OSPFv3 packet.
It should then set the Authentication Data field with Apad before the
authentication data is computed (as described in Section 4.5). The
calculated data is compared with the received authentication data in
the Authentication Trailer. If the two do not match, the packet MUST
be discarded, and an error event SHOULD be logged.
After the OSPFv3 packet has been successfully authenticated,
implementations MUST store the 64-bit cryptographic sequence number
for each OSPFv3 packet type received from the neighbor. The saved
cryptographic sequence numbers will be used for replay checking for
subsequent packets received from the neighbor.
5. Migration and Backward Compatibility
All OSPFv3 routers participating on a link SHOULD be migrated to
OSPFv3 authentication at the same time. As with OSPFv2
authentication, a mismatch in the SA ID, Authentication Type, or
message digest will result in failure to form an adjacency. For
multi-access links, communities of OSPFv3 routers could be migrated
using different Interface Instance IDs. However, at least one router
would need to form adjacencies between both the OSPFv3 routers
including and not including the Authentication Trailer. This would
result in sub-optimal routing as well as added complexity and is only
recommended in cases where authentication is desired on the link and
migrating all the routers on the link at the same time isn't
feasible.
In support of uninterrupted deployment, an OSPFv3 router implementing
this specification MAY implement a transition mode where it includes
the Authentication Trailer in transmitted packets but does not verify
this information in received packets. This is provided as a
Bhatia, et al. Standards Track [Page 16]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
transition aid for networks in the process of migrating to the
authentication mechanism described in this specification. More
specifically:
1. OSPFv3 routers in transition mode will include the OSPFv3
Authentication Trailer in transmitted packets and set the AT-bit
in the Options field of transmitted Hello and Database Description
packets. OSPFv3 routers receiving these packets and not having
authentication configured will ignore the Authentication Trailer
and AT-bit.
2. OSPFv3 routers in transition mode will also calculate and set the
OSPFv3 header checksum and the LLS data block checksum in
transmitted packets so that they will not be dropped by OSPFv3
routers without authentication configured.
3. OSPFv3 routers in transition mode will authenticate received
packets that either have the AT-bit set in the Options field for
Hello or Database Description packets or are from a neighbor that
previously set the AT-bit in the Options field of successfully
authenticated Hello and Database Description packets.
4. OSPFv3 routers in transition mode will also accept packets without
the Options field AT-bit set in Hello and Database Description
packets. These packets will be assumed to be from OSPFv3 routers
without authentication configured, and they will not be
authenticated. Additionally, the OSPFv3 header checksum and LLS
data block checksum will be validated.
6. Security Considerations
This document proposes extensions to OSPFv3 that would make it more
secure than OSPFv3 as defined in [RFC5340]. It does not provide
confidentiality, as a routing protocol contains information that does
not need to be kept secret. It does, however, provide means to
authenticate the sender of packets that are of interest. It
addresses all the security issues that have been identified in
[RFC6039] and [RFC6506].
It should be noted that the authentication method described in this
document is not being used to authenticate the specific originator of
a packet but rather is being used to confirm that the packet has
indeed been issued by a router that has access to the
Authentication Key.
Deployments SHOULD use sufficiently long and random values for the
Authentication Key so that guessing and other cryptographic attacks
on the key are not feasible in their environments. Furthermore, it
Bhatia, et al. Standards Track [Page 17]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
is RECOMMENDED that Authentication Keys incorporate at least 128
pseudorandom bits to minimize the risk of such attacks. In support
of these recommendations, management systems SHOULD support
hexadecimal input of Authentication Keys.
Deployments that support a transitionary state but interoperate with
routers that do not support this authentication method may be exposed
to unauthenticated data during the transition period.
The mechanism described herein is not perfect and does not need to be
perfect. Instead, this mechanism represents a significant increase
in the effort required for an adversary to successfully attack the
OSPFv3 protocol, while not causing undue implementation, deployment,
or operational complexity.
Refer to [RFC4552] for additional considerations on manual keying.
7. IANA Considerations
This document obsoletes RFC 6506; thus, IANA has updated the
references in existing registries that pointed to RFC 6506 to point
to this document. This is the only IANA action requested by this
document.
IANA previously allocated the AT-bit (0x000400) in the "OSPFv3
Options (24 bits)" registry as described in Section 2.1.
IANA previously created the "Open Shortest Path First v3 (OSPFv3)
Authentication Trailer Options" registry. This registry includes the
"OSPFv3 Authentication Types" registry, which defines valid values
for the Authentication Type field in the OSPFv3 Authentication
Trailer. The registration procedure is Standards Action [RFC5226].
+-------------+-----------------------------------+
|Value | Designation |
+-------------+-----------------------------------+
| 0 | Reserved |
| | |
| 1 | HMAC Cryptographic Authentication |
| | |
| 2-65535 | Unassigned |
+-------------+-----------------------------------+
OSPFv3 Authentication Types
Finally, IANA previously created the "Keying and Authentication for
Routing Protocols (KARP) Parameters" registry. This registry
includes the "Cryptographic Protocol ID" registry, which provides
Bhatia, et al. Standards Track [Page 18]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
unique protocol-specific values for cryptographic applications,
including but not limited to prevention of cross-protocol replay
attacks. Values can be assigned for both native IPv4/IPv6 protocols
and UDP/TCP protocols. The registration procedure is Standards
Action.
+-------------+----------------------+
| Value/Range | Designation |
+-------------+----------------------+
| 0 | Reserved |
| | |
| 1 | OSPFv3 |
| | |
| 2-65535 | Unassigned |
+-------------+----------------------+
Cryptographic Protocol ID
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.
[RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
for IPv6", RFC 5340, July 2008.
[RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M.,
Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic
Authentication", RFC 5709, October 2009.
8.2. Informative References
[FIPS-180-4]
US National Institute of Standards and Technology, "Secure
Hash Standard (SHS)", FIPS PUB 180-4, March 2012.
[FIPS-198-1]
US National Institute of Standards and Technology, "The
Keyed-Hash Message Authentication Code (HMAC)", FIPS
PUB 198-1, July 2008.
Bhatia, et al. Standards Track [Page 19]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
[MANUAL-KEY]
Bhatia, M., Hartman, S., and D. Zhang, "Security Extension
for OSPFv2 when using Manual Key Management", Work in
Progress, February 2011.
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
Hashing for Message Authentication", RFC 2104,
February 1997.
[RFC4222] Choudhury, G., Ed., "Prioritized Treatment of Specific
OSPF Version 2 Packets and Congestion Avoidance", BCP 112,
RFC 4222, October 2005.
[RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
December 2005.
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",
RFC 4303, December 2005.
[RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality
for OSPFv3", RFC 4552, June 2006.
[RFC4822] Atkinson, R. and M. Fanto, "RIPv2 Cryptographic
Authentication", RFC 4822, February 2007.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[RFC5310] Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic
Authentication", RFC 5310, February 2009.
[RFC5613] Zinin, A., Roy, A., Nguyen, L., Friedman, B., and D.
Yeung, "OSPF Link-Local Signaling", RFC 5613, August 2009.
[RFC5879] Kivinen, T. and D. McDonald, "Heuristics for Detecting
ESP-NULL Packets", RFC 5879, May 2010.
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
"Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 5996, September 2010.
Bhatia, et al. Standards Track [Page 20]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
[RFC6039] Manral, V., Bhatia, M., Jaeggli, J., and R. White, "Issues
with Existing Cryptographic Protection Methods for Routing
Protocols", RFC 6039, October 2010.
[RFC6506] Bhatia, M., Manral, V., and A. Lindem, "Supporting
Authentication Trailer for OSPFv3", RFC 6506,
February 2012.
Bhatia, et al. Standards Track [Page 21]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Appendix A. Acknowledgments
First and foremost, thanks to the US National Institute of Standards
and Technology for their work on the SHA [FIPS-180-4] and HMAC
[FIPS-198-1].
Thanks also need to go to the authors of the HMAC-SHA authentication
RFCs, including [RFC4822], [RFC5310], and [RFC5709]. The basic
HMAC-SHA procedures were originally described by Ran Atkinson in
[RFC4822].
Also, thanks to Ran Atkinson for help in the analysis of RFC 6506
errata.
Thanks to Srinivasan K L and Marek Karasek for their identification
and submission of RFC 6506 errata.
Thanks to Sam Hartman for discussions on replay mitigation and the
use of a 64-bit strictly increasing sequence number. Also, thanks to
Sam for comments during IETF last call with respect to the OSPFv3 SA
and the sharing of keys between protocols.
Thanks to Michael Barnes for numerous comments and strong input on
the coverage of LLS by the Authentication Trailer (AT).
Thanks to Marek Karasek for providing the specifics with respect to
backward-compatible transition mode.
Thanks to Michael Dubrovskiy and Anton Smirnov for comments on
document revisions.
Thanks to Rajesh Shetty for numerous comments, including the
suggestion to include an Authentication Type field in the
Authentication Trailer for extendibility.
Thanks to Uma Chunduri for suggesting that we may want to protect the
IPv6 source address even though OSPFv3 uses the Router ID for
neighbor identification.
Thanks to Srinivasan K L, Shraddha H, Alan Davey, Russ White, Stan
Ratliff, and Glen Kent for their support and review comments.
Thanks to Alia Atlas for comments made under the purview of the
Routing Directorate review.
Thanks to Stephen Farrell for comments during the IESG review.
Stephen was also involved in the discussion of cross-protocol
attacks.
Bhatia, et al. Standards Track [Page 22]
^L
RFC 7166 Authentication Trailer for OSPFv3 March 2014
Thanks to Brian Carpenter for comments made during the Gen-ART
review.
Thanks to Victor Kuarsingh for the OPS-DIR review.
Thanks to Brian Weis for the SEC-DIR review.
Authors' Addresses
Manav Bhatia
Alcatel-Lucent
Bangalore
India
EMail: manav.bhatia@alcatel-lucent.com
Vishwas Manral
Ionos Corp.
4100 Moorpark Ave.
San Jose, CA 95117
USA
EMail: vishwas@ionosnetworks.com
Acee Lindem
Ericsson
301 Midenhall Way
Cary, NC 27513
USA
EMail: acee.lindem@ericsson.com
Bhatia, et al. Standards Track [Page 23]
^L
|