[OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols

"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Thu, 14 April 2011 02:32 UTC

Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: ospf@ietfc.amsl.com
Delivered-To: ospf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 22E6EE07AA for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 19:32:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.915
X-Spam-Level:
X-Spam-Status: No, score=-5.915 tagged_above=-999 required=5 tests=[AWL=0.684, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6nLAencwucOV for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 19:32:19 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by ietfc.amsl.com (Postfix) with ESMTP id 54604E0707 for <ospf@ietf.org>; Wed, 13 Apr 2011 19:32:19 -0700 (PDT)
Received: from inbansmailrelay2.in.alcatel-lucent.com (h135-250-11-33.lucent.com [135.250.11.33]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p3E2WFvh026185 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ospf@ietf.org>; Wed, 13 Apr 2011 21:32:18 -0500 (CDT)
Received: from INBANSXCHHUB03.in.alcatel-lucent.com (inbansxchhub03.in.alcatel-lucent.com [135.250.12.80]) by inbansmailrelay2.in.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p3E2WECB014445 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <ospf@ietf.org>; Thu, 14 Apr 2011 08:02:15 +0530
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.50]) by INBANSXCHHUB03.in.alcatel-lucent.com ([135.250.12.80]) with mapi; Thu, 14 Apr 2011 08:02:14 +0530
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: "ospf@ietf.org" <ospf@ietf.org>
Date: Thu, 14 Apr 2011 08:02:12 +0530
Thread-Topic: Using dynamically derived Traffic Keys for Routing Protocols
Thread-Index: Acv6NTMFTlWOl/kBQCiD5tHWT/WyAQAFtRvA
Message-ID: <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Subject: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2011 02:32:20 -0000

OSPFers,

Can a variant of this method be used to protect OSPFv2 and OSPFv3-AT? 

Cheers, Manav

> -----Original Message-----
> From: karp-bounces@ietf.org [mailto:karp-bounces@ietf.org] On 
> Behalf Of Bhatia, Manav (Manav)
> Sent: Thursday, April 14, 2011 5.18 AM
> To: karp@ietf.org
> Subject: [karp] Using dynamically derived Traffic Keys for 
> Routing Protocols
> 
> Hi,
> 
> Instead of using the pre shared key (PSK) in manual keying 
> for all packets the routing protocols could use a traffic key 
> that's derived from the PSK using some key derivation 
> function. Each side could announce a random number (a nonce) 
> and the KDF could mix this with the PSK to derive the traffic 
> key per session. Benefits of this approach:
> 
> o Key rollover becomes very easy as it's a local decision now 
> requiring now co-ordination with our peers. Each side can 
> generate a new nonce and all others recompute the traffic key 
> based on the new nonce value. Attackers cant inject packets 
> with spurious nonces as this packet will be protected using 
> the traffic key based on the nonce that others have sent.
> 
> o Avoids inter-session replay attacks without involving non 
> volatile memory as each router will use a different nonce 
> upon booting up.
> 
> In OSPF the nonce could be carried in the HELLO packets. 
> There could be bit carried in the HELLOs which would indicate 
> that the Hello is currently using the long lived key (or the 
> PSK). The receiver upon receiving this would authenticate the 
> packet using the PSK and would use the KDF to derive the 
> traffic key. The KDF would mix the nonce with the PSK in some 
> deterministic fashion. The receiver uses the derived traffic 
> key for signing all subsequent OSPF packets and would 
> indicate this by setting some bit (which says using traffic 
> key). It will also include its own nonce. The original sender 
> now uses the nonce that it receives and starts using the 
> traffic key derived from this nonce for all subsequent 
> packets. For a key rollover, the senders just have to choose 
> a new nonce value. This can be done as frequently as desired 
> and requires no manual intervention. 
> 
> Does this sound as going in the right direction?
> 
> Cheers, Manav
> 
> --
> Manav Bhatia,
> Service Router Product Group (SRPG)
> Alcatel-Lucent, India
> _______________________________________________
> karp mailing list
> karp@ietf.org
> https://www.ietf.org/mailman/listinfo/karp
>