Re: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
Curtis Villamizar <curtis@occnc.com> Thu, 14 April 2011 04:19 UTC
Return-Path: <curtis@occnc.com>
X-Original-To: ospf@ietfc.amsl.com
Delivered-To: ospf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 2EED1E06D3 for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 21:19:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.321
X-Spam-Level:
X-Spam-Status: No, score=-2.321 tagged_above=-999 required=5 tests=[AWL=0.278, BAYES_00=-2.599]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Krjn1NiJTzp for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 21:19:08 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by ietfc.amsl.com (Postfix) with ESMTP id 0ADA2E06F0 for <ospf@ietf.org>; Wed, 13 Apr 2011 21:19:07 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by harbor.orleans.occnc.com (8.13.6/8.13.6) with ESMTP id p3E4J65C025986; Thu, 14 Apr 2011 00:19:06 -0400 (EDT) (envelope-from curtis@harbor.orleans.occnc.com)
Message-Id: <201104140419.p3E4J65C025986@harbor.orleans.occnc.com>
To: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
From: Curtis Villamizar <curtis@occnc.com>
In-reply-to: Your message of "Thu, 14 Apr 2011 08:02:12 +0530." <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com>
Date: Thu, 14 Apr 2011 00:19:06 -0400
Sender: curtis@occnc.com
Cc: "ospf@ietf.org" <ospf@ietf.org>
Subject: Re: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: curtis@occnc.com
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2011 04:19:09 -0000
In message <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com> "Bhatia, Manav (Manav)" writes: > > OSPFers, > > Can a variant of this method be used to protect OSPFv2 and OSPFv3-AT? > > Cheers, Manav Hesitant to say "me too" again for S/N reasons, but ... yes/agree Someone needs to write up the details though. (and Manav seems willing to volunteer). Curtis > > -----Original Message----- > > From: karp-bounces@ietf.org [mailto:karp-bounces@ietf.org] On > > Behalf Of Bhatia, Manav (Manav) > > Sent: Thursday, April 14, 2011 5.18 AM > > To: karp@ietf.org > > Subject: [karp] Using dynamically derived Traffic Keys for > > Routing Protocols > > > > Hi, > > > > Instead of using the pre shared key (PSK) in manual keying > > for all packets the routing protocols could use a traffic key > > that's derived from the PSK using some key derivation > > function. Each side could announce a random number (a nonce) > > and the KDF could mix this with the PSK to derive the traffic > > key per session. Benefits of this approach: > > > > o Key rollover becomes very easy as it's a local decision now > > requiring now co-ordination with our peers. Each side can > > generate a new nonce and all others recompute the traffic key > > based on the new nonce value. Attackers cant inject packets > > with spurious nonces as this packet will be protected using > > the traffic key based on the nonce that others have sent. > > > > o Avoids inter-session replay attacks without involving non > > volatile memory as each router will use a different nonce > > upon booting up. > > > > In OSPF the nonce could be carried in the HELLO packets. > > There could be bit carried in the HELLOs which would indicate > > that the Hello is currently using the long lived key (or the > > PSK). The receiver upon receiving this would authenticate the > > packet using the PSK and would use the KDF to derive the > > traffic key. The KDF would mix the nonce with the PSK in some > > deterministic fashion. The receiver uses the derived traffic > > key for signing all subsequent OSPF packets and would > > indicate this by setting some bit (which says using traffic > > key). It will also include its own nonce. The original sender > > now uses the nonce that it receives and starts using the > > traffic key derived from this nonce for all subsequent > > packets. For a key rollover, the senders just have to choose > > a new nonce value. This can be done as frequently as desired > > and requires no manual intervention. > > > > Does this sound as going in the right direction? > > > > Cheers, Manav > > > > -- > > Manav Bhatia, > > Service Router Product Group (SRPG) > > Alcatel-Lucent, India > > _______________________________________________ > > karp mailing list > > karp@ietf.org > > https://www.ietf.org/mailman/listinfo/karp > > > _______________________________________________ > OSPF mailing list > OSPF@ietf.org > https://www.ietf.org/mailman/listinfo/ospf
- [OSPF] FW: Using dynamically derived Traffic Keys… Bhatia, Manav (Manav)
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Manav Bhatia
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Manav Bhatia
- Re: [OSPF] FW: Using dynamically derived Traffic … Curtis Villamizar
- Re: [OSPF] FW: Using dynamically derived Traffic … Bhatia, Manav (Manav)