[OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Thu, 14 April 2011 02:32 UTC
Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: ospf@ietfc.amsl.com
Delivered-To: ospf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 22E6EE07AA for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 19:32:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.915
X-Spam-Level:
X-Spam-Status: No, score=-5.915 tagged_above=-999 required=5 tests=[AWL=0.684, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6nLAencwucOV for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 19:32:19 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by ietfc.amsl.com (Postfix) with ESMTP id 54604E0707 for <ospf@ietf.org>; Wed, 13 Apr 2011 19:32:19 -0700 (PDT)
Received: from inbansmailrelay2.in.alcatel-lucent.com (h135-250-11-33.lucent.com [135.250.11.33]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p3E2WFvh026185 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ospf@ietf.org>; Wed, 13 Apr 2011 21:32:18 -0500 (CDT)
Received: from INBANSXCHHUB03.in.alcatel-lucent.com (inbansxchhub03.in.alcatel-lucent.com [135.250.12.80]) by inbansmailrelay2.in.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p3E2WECB014445 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <ospf@ietf.org>; Thu, 14 Apr 2011 08:02:15 +0530
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.50]) by INBANSXCHHUB03.in.alcatel-lucent.com ([135.250.12.80]) with mapi; Thu, 14 Apr 2011 08:02:14 +0530
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: "ospf@ietf.org" <ospf@ietf.org>
Date: Thu, 14 Apr 2011 08:02:12 +0530
Thread-Topic: Using dynamically derived Traffic Keys for Routing Protocols
Thread-Index: Acv6NTMFTlWOl/kBQCiD5tHWT/WyAQAFtRvA
Message-ID: <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Subject: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2011 02:32:20 -0000
OSPFers, Can a variant of this method be used to protect OSPFv2 and OSPFv3-AT? Cheers, Manav > -----Original Message----- > From: karp-bounces@ietf.org [mailto:karp-bounces@ietf.org] On > Behalf Of Bhatia, Manav (Manav) > Sent: Thursday, April 14, 2011 5.18 AM > To: karp@ietf.org > Subject: [karp] Using dynamically derived Traffic Keys for > Routing Protocols > > Hi, > > Instead of using the pre shared key (PSK) in manual keying > for all packets the routing protocols could use a traffic key > that's derived from the PSK using some key derivation > function. Each side could announce a random number (a nonce) > and the KDF could mix this with the PSK to derive the traffic > key per session. Benefits of this approach: > > o Key rollover becomes very easy as it's a local decision now > requiring now co-ordination with our peers. Each side can > generate a new nonce and all others recompute the traffic key > based on the new nonce value. Attackers cant inject packets > with spurious nonces as this packet will be protected using > the traffic key based on the nonce that others have sent. > > o Avoids inter-session replay attacks without involving non > volatile memory as each router will use a different nonce > upon booting up. > > In OSPF the nonce could be carried in the HELLO packets. > There could be bit carried in the HELLOs which would indicate > that the Hello is currently using the long lived key (or the > PSK). The receiver upon receiving this would authenticate the > packet using the PSK and would use the KDF to derive the > traffic key. The KDF would mix the nonce with the PSK in some > deterministic fashion. The receiver uses the derived traffic > key for signing all subsequent OSPF packets and would > indicate this by setting some bit (which says using traffic > key). It will also include its own nonce. The original sender > now uses the nonce that it receives and starts using the > traffic key derived from this nonce for all subsequent > packets. For a key rollover, the senders just have to choose > a new nonce value. This can be done as frequently as desired > and requires no manual intervention. > > Does this sound as going in the right direction? > > Cheers, Manav > > -- > Manav Bhatia, > Service Router Product Group (SRPG) > Alcatel-Lucent, India > _______________________________________________ > karp mailing list > karp@ietf.org > https://www.ietf.org/mailman/listinfo/karp >
- [OSPF] FW: Using dynamically derived Traffic Keys… Bhatia, Manav (Manav)
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Manav Bhatia
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Manav Bhatia
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Bhatia, Manav (Manav)