[OSPF] FW: New Version Notification for draft-ietf-ospf-security-extension-manual-keying-09.txt

"Acee Lindem (acee)" <acee@cisco.com> Tue, 07 October 2014 13:56 UTC

Return-Path: <acee@cisco.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E41B01ACD93 for <ospf@ietfa.amsl.com>; Tue, 7 Oct 2014 06:56:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.773
X-Spam-Level:
X-Spam-Status: No, score=-13.773 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.786, SPF_PASS=-0.001, URIBL_RHS_DOB=1.514, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0WNPXWnaizi3 for <ospf@ietfa.amsl.com>; Tue, 7 Oct 2014 06:56:19 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C40511ACD9B for <ospf@ietf.org>; Tue, 7 Oct 2014 06:56:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2069; q=dns/txt; s=iport; t=1412690163; x=1413899763; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=gOGHXSvJlIBLi8UbkoO3t6Tegvc7EK3EGKNkWMmFsW8=; b=EyF+6K35eh0T0z/jtFOLKswZT2Pit19DbhIhhRpevkV1VxKDUyLyblEq TuhBYsRdJy1hOwj9l2LAl2QihzZiBfMyn7Gmc7Jads2H02ZXCmPbpYwp3 OycH/BfNWPbVRB95yI176vBrejHa+cap4snboKRQTtQzTqgsOf/l7ZCKu 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AisFAJvvM1StJV2d/2dsb2JhbABfgw5TUwUEzQSHSwKBDxYBe4QEAQEEdxICAQhGMhsBBgMCBBMJiDUIBcFwAReQS4RLBYsehliEPocOgS08gwiRF4FsHhaBQ2yBSIECAQEB
X-IronPort-AV: E=Sophos;i="5.04,670,1406592000"; d="scan'208";a="361299933"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-3.cisco.com with ESMTP; 07 Oct 2014 13:56:03 +0000
Received: from xhc-aln-x06.cisco.com (xhc-aln-x06.cisco.com [173.36.12.80]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id s97Du3sB000474 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <ospf@ietf.org>; Tue, 7 Oct 2014 13:56:03 GMT
Received: from xmb-aln-x06.cisco.com ([169.254.1.175]) by xhc-aln-x06.cisco.com ([173.36.12.80]) with mapi id 14.03.0195.001; Tue, 7 Oct 2014 08:56:02 -0500
From: "Acee Lindem (acee)" <acee@cisco.com>
To: OSPF WG List <ospf@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-ospf-security-extension-manual-keying-09.txt
Thread-Index: AQHP4hrKaTp7LQfj6EOXdkuFEnbgqZwkuWiA
Date: Tue, 7 Oct 2014 13:56:02 +0000
Message-ID: <D0596902.440E%acee@cisco.com>
References: <20141007103803.28280.59076.idtracker@ietfa.amsl.com>
In-Reply-To: <20141007103803.28280.59076.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.116.152.196]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <071A179FC86A19458E47168022978932@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/ospf/AyyG55oaI2u3BPp5LqUWivGAJDo
Subject: [OSPF] FW: New Version Notification for draft-ietf-ospf-security-extension-manual-keying-09.txt
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Oct 2014 13:56:25 -0000

This version just addresses Alia┬╣s AD review comments. The draft is in
IESG Last Call. 
Thanks,
Acee 

On 10/7/14, 6:38 AM, "internet-drafts@ietf.org"; <internet-drafts@ietf.org>;
wrote:

>
>A new version of I-D,
>draft-ietf-ospf-security-extension-manual-keying-09.txt
>has been successfully submitted by Manav Bhatia and posted to the
>IETF repository.
>
>Name:		draft-ietf-ospf-security-extension-manual-keying
>Revision:	09
>Title:		Security Extension for OSPFv2 when using Manual Key Management
>Document date:	2014-10-06
>Group:		ospf
>Pages:		13
>URL:            
>http://www.ietf.org/internet-drafts/draft-ietf-ospf-security-extension-man
>ual-keying-09.txt
>Status:         
>https://datatracker.ietf.org/doc/draft-ietf-ospf-security-extension-manual
>-keying/
>Htmlized:       
>http://tools.ietf.org/html/draft-ietf-ospf-security-extension-manual-keyin
>g-09
>Diff:           
>http://www.ietf.org/rfcdiff?url2=draft-ietf-ospf-security-extension-manual
>-keying-09
>
>Abstract:
>   The current OSPFv2 cryptographic authentication mechanism as defined
>   in RFC 2328 and RFC 5709 is vulnerable to both inter-session and
>   intra-session replay attacks when using manual keying.  Additionally,
>   the existing cryptographic authentication mechanism does not cover
>   the IP header.  This omission can be exploited to carry out various
>   types of attacks.
>
>   This draft proposes changes to the authentication sequence number
>   mechanism that will protect OSPFv2 from both inter-session and intra-
>   session replay attacks when using manual keys for securing OSPFv2
>   protocol packets.  Additionally, we also describe some changes in the
>   cryptographic hash computation that will eliminate attacks resulting
>   from OSPFv2 not protecting the IP header.
>
>                  
>        
>
>
>Please note that it may take a couple of minutes from the time of
>submission
>until the htmlized version and diff are available at tools.ietf.org.
>
>The IETF Secretariat
>