Re: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols

Curtis Villamizar <curtis@occnc.com> Thu, 14 April 2011 04:19 UTC

Return-Path: <curtis@occnc.com>
X-Original-To: ospf@ietfc.amsl.com
Delivered-To: ospf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 2EED1E06D3 for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 21:19:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.321
X-Spam-Level:
X-Spam-Status: No, score=-2.321 tagged_above=-999 required=5 tests=[AWL=0.278, BAYES_00=-2.599]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Krjn1NiJTzp for <ospf@ietfc.amsl.com>; Wed, 13 Apr 2011 21:19:08 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by ietfc.amsl.com (Postfix) with ESMTP id 0ADA2E06F0 for <ospf@ietf.org>; Wed, 13 Apr 2011 21:19:07 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by harbor.orleans.occnc.com (8.13.6/8.13.6) with ESMTP id p3E4J65C025986; Thu, 14 Apr 2011 00:19:06 -0400 (EDT) (envelope-from curtis@harbor.orleans.occnc.com)
Message-Id: <201104140419.p3E4J65C025986@harbor.orleans.occnc.com>
To: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
From: Curtis Villamizar <curtis@occnc.com>
In-reply-to: Your message of "Thu, 14 Apr 2011 08:02:12 +0530." <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com>
Date: Thu, 14 Apr 2011 00:19:06 -0400
Sender: curtis@occnc.com
Cc: "ospf@ietf.org" <ospf@ietf.org>
Subject: Re: [OSPF] FW: Using dynamically derived Traffic Keys for Routing Protocols
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: curtis@occnc.com
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2011 04:19:09 -0000

In message <7C362EEF9C7896468B36C9B79200D8350CFD0DE257@INBANSXCHMBSA1.in.alcatel-lucent.com>
"Bhatia, Manav (Manav)" writes:
>  
> OSPFers,
>  
> Can a variant of this method be used to protect OSPFv2 and OSPFv3-AT? 
>  
> Cheers, Manav


Hesitant to say "me too" again for S/N reasons, but ...  yes/agree

Someone needs to write up the details though.  (and Manav seems
willing to volunteer).

Curtis



> > -----Original Message-----
> > From: karp-bounces@ietf.org [mailto:karp-bounces@ietf.org] On 
> > Behalf Of Bhatia, Manav (Manav)
> > Sent: Thursday, April 14, 2011 5.18 AM
> > To: karp@ietf.org
> > Subject: [karp] Using dynamically derived Traffic Keys for 
> > Routing Protocols
> > 
> > Hi,
> > 
> > Instead of using the pre shared key (PSK) in manual keying 
> > for all packets the routing protocols could use a traffic key 
> > that's derived from the PSK using some key derivation 
> > function. Each side could announce a random number (a nonce) 
> > and the KDF could mix this with the PSK to derive the traffic 
> > key per session. Benefits of this approach:
> > 
> > o Key rollover becomes very easy as it's a local decision now 
> > requiring now co-ordination with our peers. Each side can 
> > generate a new nonce and all others recompute the traffic key 
> > based on the new nonce value. Attackers cant inject packets 
> > with spurious nonces as this packet will be protected using 
> > the traffic key based on the nonce that others have sent.
> > 
> > o Avoids inter-session replay attacks without involving non 
> > volatile memory as each router will use a different nonce 
> > upon booting up.
> > 
> > In OSPF the nonce could be carried in the HELLO packets. 
> > There could be bit carried in the HELLOs which would indicate 
> > that the Hello is currently using the long lived key (or the 
> > PSK). The receiver upon receiving this would authenticate the 
> > packet using the PSK and would use the KDF to derive the 
> > traffic key. The KDF would mix the nonce with the PSK in some 
> > deterministic fashion. The receiver uses the derived traffic 
> > key for signing all subsequent OSPF packets and would 
> > indicate this by setting some bit (which says using traffic 
> > key). It will also include its own nonce. The original sender 
> > now uses the nonce that it receives and starts using the 
> > traffic key derived from this nonce for all subsequent 
> > packets. For a key rollover, the senders just have to choose 
> > a new nonce value. This can be done as frequently as desired 
> > and requires no manual intervention. 
> > 
> > Does this sound as going in the right direction?
> > 
> > Cheers, Manav
> > 
> > --
> > Manav Bhatia,
> > Service Router Product Group (SRPG)
> > Alcatel-Lucent, India
> > _______________________________________________
> > karp mailing list
> > karp@ietf.org
> > https://www.ietf.org/mailman/listinfo/karp
> > 
> _______________________________________________
> OSPF mailing list
> OSPF@ietf.org
> https://www.ietf.org/mailman/listinfo/ospf