[RPSEC] Authentication for OSPFv3

Ed Jankiewicz <edward.jankiewicz@sri.com> Mon, 29 September 2008 18:49 UTC

Return-Path: <rpsec-bounces@ietf.org>
X-Original-To: rpsec-archive@megatron.ietf.org
Delivered-To: ietfarch-rpsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C2833A6A05; Mon, 29 Sep 2008 11:49:59 -0700 (PDT)
X-Original-To: rpsec@core3.amsl.com
Delivered-To: rpsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BEFBB28C245 for <rpsec@core3.amsl.com>; Tue, 23 Sep 2008 14:52:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.046
X-Spam-Level:
X-Spam-Status: No, score=-6.046 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tFi1dLYv9e5N for <rpsec@core3.amsl.com>; Tue, 23 Sep 2008 14:52:06 -0700 (PDT)
Received: from mailgate-internal3.sri.com (mailgate-internal3.SRI.COM [128.18.84.113]) by core3.amsl.com (Postfix) with SMTP id F1E2428C257 for <rpsec@ietf.org>; Tue, 23 Sep 2008 14:52:05 -0700 (PDT)
Received: from smssmtp-internal1.sri.com (128.18.84.115) by mailgate-internal3.sri.com with SMTP; 23 Sep 2008 21:52:09 -0000
X-AuditID: 80125473-ad9adbb000000a1e-1d-48d96509007e
Received: from srimail1.sri.com (srimail1.SRI.COM [128.18.30.11]) by smssmtp-internal1.sri.com (Symantec Mail Security) with ESMTP id A108F21AF2C; Tue, 23 Sep 2008 14:52:09 -0700 (PDT)
Received: from [192.168.2.101] (static-72-90-189-2.nwrknj.east.verizon.net [72.90.189.2]) by mail.sri.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPSA id <0K7O004144QWSL93@mail.sri.com>; Tue, 23 Sep 2008 14:52:09 -0700 (PDT)
Date: Tue, 23 Sep 2008 17:52:07 -0400
From: Ed Jankiewicz <edward.jankiewicz@sri.com>
To: ospf@ietf.org, rpsec@ietf.org, sidr@ietf.org, msec@ietf.org, tsvwg@ietf.org
Message-id: <48D96507.4000207@sri.com>
MIME-version: 1.0
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
X-Brightmail-Tracker: AAAAAA==
X-Mailman-Approved-At: Mon, 29 Sep 2008 11:49:58 -0700
Subject: [RPSEC] Authentication for OSPFv3
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: rpsec-bounces@ietf.org
Errors-To: rpsec-bounces@ietf.org

I am not an active follower of these lists but have a question.  Please 
reply off-list directly to ed.jankiewicz@sri.com or copy me if this 
triggers relevant discussion on your list.

What (if any) current initiatives are there that would support automated 
key exchange for OSFPv3 authentication?  RFC 4552 relies upon pre-shared 
secret keys for generating message digest, but some of my constituents 
have issues with manual generation, distribution and configuration of 
keys in their IPv6 network deployment.  Is any of the current work on 
IKE revisions applicable, any work being done in your working group, or 
do you know of any OSPF-specific solution being developed somewhere?

Thanks.

-- 
Ed Jankiewicz - SRI International
Fort Monmouth Branch Office - IPv6 Research 
Supporting DISA Standards Engineering Branch
732-389-1003 or  ed.jankiewicz@sri.com 

_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www.ietf.org/mailman/listinfo/rpsec