Network Working Group Luyuan Fang (Ed) Internet Draft Michael Behringer Category: Informational Cisco Systems, Inc. Expires:August 2007January 2008 Ross Callon Juniper Networks J. L. Le Roux France Telecom Raymond Zhang British Telecom Paul Knight Nortel Yaakov Stein RAD Data CommunicationsFebruaryNabil Bitar Verizon Richard Graveman RFC Security, LLC July 2007 Security Framework for MPLS and GMPLS Networksdraft-fang-mpls-gmpls-security-framework-00.txtdraft-fang-mpls-gmpls-security-framework-01.txt Status of this MemoThis memo provides information for the Internet community. It does not specify an Internet standard ofBy submitting this Internet-Draft, each author represents that anykind. Distributionapplicable patent or other IPR claims ofthis memowhich he or she isunlimited.aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.IPR Disclosure Acknowledgement By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.Copyright NoticeCopyright (C) The IETF Trust (2007).Fang, et al. Informational 1 MPLS/GMPLS Security frameworkFebruary 2007Copyright (C) The IETF Trust (2007). Abstract This document provides a security framework for Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) Networks (MPLS and GMPLS are described in [RFC3031] and [RFC3945]). This document addresses the security aspects that are relevant in the context of MPLS and GMPLS. It describes the security threats, the related defensive techniques, and the mechanisms for detection and reporting. This documentgives emphasis toemphasizes RSVP-TE and LDP security considerations, as well as Inter-AS and Inter-provider security considerations for building and maintaining MPLS and GMPLS networks across different domains or different Service Providers. Table of Contents 1.Introduction..................................................3Introduction.................................................3 1.1. Structure ofThis Document.................................4this Document................................4 1.2.Contributors...............................................5Contributors..............................................5 2.Terminology...................................................5Terminology .................................................5 2.1.Terminology................................................5Terminology...............................................5 2.2. Acronyms andAbbreviations.................................7Abbreviations................................7 3. Security ReferenceModels.....................................7Models....................................7 4. SecurityThreats..............................................9Threats.............................................9 4.1. Attacks on the ControlPlane..............................10Plane.............................11 4.2. Attacks on the DataPlane.................................13Plane................................14 5. Defensive Techniques for MPLS/GMPLSNetworks.................15Networks................15 5.1.Cryptographic techniques..................................16Authentication ..........................................16 5.2.Authentication............................................24Cryptographic techniques.................................18 5.3. Access Controltechniques.................................25techniques................................27 5.4. Use of IsolatedInfrastructure............................29Infrastructure...........................32 5.5. Use of AggregatedInfrastructure..........................30Infrastructure.........................32 5.6. Service Provider Quality ControlProcesses................30Processes...............33 5.7. Deployment of Testable MPLS/GMPLSService.................31Service................33 6. Monitoring, Detection, and Reporting of SecurityAttacks.....31Attacks....33 7. Service Provider General SecurityRequirements...............32Requirements..............35 7.1. Protection within the CoreNetwork........................32Network.......................35 7.2. Protection on the User AccessLink........................36Link.......................39 7.3. General Requirements for MPLS/GMPLSProviders.............38Providers ...........40 8. Inter-provider SecurityRequirements.........................38 8.1. Control Plane Protection..................................39Requirements........................41 Fang, et al. Informational 2 MPLS/GMPLS Security frameworkFebruary 20078.1. Control Plane Protection.................................41 8.2. Data PlaneProtection.....................................43Protection....................................45 9. SecurityConsiderations......................................44Considerations.....................................47 10. IANAConsiderations........................................45Considerations.......................................47 11. NormativeReferences.......................................45References .....................................48 12. InformationalReferences...................................46References..................................49 13. Author'sAddresses.........................................47Addresses........................................50 14.Acknowledgement............................................49Acknowledgements..........................................53 Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC2119 [RFC 2119]. 1. Introduction Security is an important aspect of all networks, MPLS and GMPLS networks being no exception. MPLS and GMPLS are described in [RFC3031] and [RFC3945]. Various security considerations have been addressed in each of the many RFCsthat addresson MPLS and GMPLS technologies, butthere has not been ano single documentwhich providescovers general security considerations. The motivation for creating this document is to provide a comprehensive and consistent security framework for MPLS and GMPLS networks. Each individual document may point to this document for general security considerations in addition to providingthesecurity considerationswhich arespecific to the particular technologies the document is describing. In this document, we first describe the security threatsthat arerelevant in the context of MPLS andGMPLS,GMPLS and the defensive techniquesthat can be usedto combat those threats. We consider security issues deriving both from malicious or incorrect behavior of users and other parties and from negligent or incorrect behavior oftheproviders. An important part of security defense is the detection andreportreporting of a security attack, which is also addressed in this document. We then discussthepossible service provider security requirements in a MPLS or GMPLS environment.The usersUsers have expectationsthat need to be met onfor the security characteristics of MPLS or GMPLS networks. Thesewillincludethesecurity requirements for equipment supporting MPLS and GMPLSsupporting equipments,andthe provider operationoperational security requirements for providers. Service providers Fang, et al. Informational 3 MPLS/GMPLS Security frameworkFebruary 2007 requirements. The service providersmust protect their networkinfrastructure,infrastructure and make it secure to the level required to provide services over their MPLS or GMPLS networks.Inter-AsInter-AS and Inter-provider security are discussed with special emphasis,sincebecause the security risk factors are higher with inter- provider connections. Depending on different MPLS or GMPLS techniques used, the degree of risk and the mitigation methodologies vary. This document discusses the security aspects and requirements for certain basic MPLS and GMPLS techniques and inter-connection models. This document does not attempt to cover all current and future MPLS and GMPLS technologies,sinceas it is not within the scope of this document to analyze the security properties of specific technologies. It is important to clarify that, in thisdocument;document, we limit ourselves to describing the providers' security requirements that pertain to MPLS and GMPLS networks. Readers may refer to the "Security Best Practices Efforts and Documents" [opsec effort] and "Security Mechanisms for the Internet" [RFC3631] for general network operation security considerations. It is not our intention, however, to formulate precise "requirements"onfor each specific technology in terms of defining the mechanisms and techniques that must be implemented to satisfy such security requirements. 1.1. Structure ofThisthis Document This document is organized as follows. In Section 2, we define the terminologyused in the document.used. InsectionSection 3, we define the security reference models for security in MPLS/GMPLS networks, which we use in the rest of the document. In Section 4, we describe the security threatsthat arespecificofto MPLS and GMPLS. In Section 5, we reviewdefensedefensive techniques that may be used against those threats. In Section 6, we describe how attacks may be detected and reported. In Section 7, we describe security requirementsthat the providerproviders may havein orderto guarantee the security of the network infrastructureto providefor MPLS/GMPLS services. In section 8, we discuss Inter-provider security requirements. Finally, in Section 9, we discuss security considerationsoffor this document. This document has used relevant content from RFC 4111 "Security Framework of Provider ProvisionedVPN"VPN for Provider-Provisioned Virtual Private Networks (PPVPNs)" [RFC4111], and "MPLS InterCarrier Interconnect Technical Specification" [MFA MPLS ICI] in the Inter-provider security discussion. We acknowledge the authors of these documents for the valuable information and text. Fang, et al. Informational 4 MPLS/GMPLS Security frameworkFebruary 20071.2. Contributors As the design team membersoffor the MPLSsecuritySecurity Framework, the following made significant contributions to this document.Nabil Bitar, VerizonMonique Morrow, Cisco systems, Inc. JerryAsh, AT&TAsh 2. Terminology 2.1. Terminology This document uses MPLS and GMPLS specific terminology. Definitions and details about MPLS and GMPLS terminology can be found in [RFC3031] and [RFC3945]. The most important definitions are repeated in thissection,section; for other definitions the reader is referred to [RFC3031] and [RFC3945].CE:Customer Edgedevice.(CE) device: A Customer Edge device is a router or a switch in thecustomercustomer's network interfacing with the Service Provider's network. Forwardingequivalence classEquivalence Class (FEC): A group of IP packetswhichthat are forwarded in the same manner (e.g., over the same path, with the same forwardingtreatment)treatment). Label: Ashortshort, fixedlengthlength, physically contiguous identifierwhich isused to identify a FEC, usually of local significance. Labelswitched hop: theSwitched Hop: A hop between two MPLS nodes, on which forwarding is done using labels. Labelswitched pathSwitched Path (LSP): The path through one or more LSRs at one level of the hierarchy followed by a packets in a particular FEC. Labelswitching routerSwitching Router (LSR):anA MPLS nodewhich iscapable of forwarding native L3packetspackets. Layer 2:theThe protocol layer under layer 3 (which therefore offers the services used by layer 3). Forwarding, when done by the swapping of short fixed length labels, occurs at layer 2 regardless of whether the label being examined is an ATM VPI/VCI, a frame relay DLCI, orana MPLS label. Fang, et al. Informational 5 MPLS/GMPLS Security frameworkFebruary 2007Layer 3:theThe protocol layer at which IP and its associated routing protocolsoperate link layer synonymousoperate. Link Layer: Synonymous with layer 2. Loopdetection: aDetection: A method of dealing with loops in which loops are allowed to be set up, and data may be transmitted over the loop, but the loop is later detected. Loopprevention: aPrevention: A method of dealing with loops in which data is never transmitted over a loop. Labelstack: anStack: An ordered set of labels. Mergepoint: aPoint: A node at which label merging isdonedone. MPLSdomain: aDomain: A contiguous set of nodeswhich operatethat perform MPLS routing and forwarding andwhichare also in one Routing or Administrative Domain. MPLSedge node: anEdge Node: A MPLS node that connectsana MPLS domain with a nodewhich isoutside of the domain, either because it does not run MPLS,and/oror because it is in a different domain. Note that ifana LSR has a neighboring hostwhich isnot running MPLS,thatthen that LSR isana MPLS edge node.P: Provider Router. The Provider Router is a router in the Service Provider's core network that does not have interfaces directly towards the customer. A P router is used to interconnect the PE routers.MPLSegress node: anEgress Node: A MPLS edge node in its role in handling traffic as it leavesana MPLSdomaindomain. MPLSingress node: anIngress Node: A MPLS edge node in its role in handling traffic as it entersana MPLSdomaindomain. MPLSlabel: aLabel: A labelwhich iscarried in a packet header,andwhich represents the packet'sFECFEC. MPLSnode: aNode: A nodewhich isrunning MPLS.AnA MPLS nodewill beis aware of MPLS control protocols,will operateruns one or more L3 routing protocols, andwill beis capable of forwarding packets based on labels.AnA MPLS node may optionally be also capable of forwarding native L3 packets. MultiProtocol Label Switching (MPLS):anAn IETF working group and the effort associated with the workinggroupgroup. P: Provider Router. A Provider Router is a router in the Service Provider's core network that does not have interfaces directly towards the customer. A P router is used to interconnect the PE routers. Fang, et al. Informational 6 MPLS/GMPLS Security frameworkFebruary 2007PE: Provider Edge device.TheA Provider Edge device is the equipment in the Service Provider's network that interfaces with the equipment in the customer's network.SP: Service Provider.VPN: Virtual PrivateNetwork. RestrictedNetwork, which restricts communication between a set of sites, making use of an IP backbonewhich isshared by trafficthat isnot going to or not coming from thosesites. [RFC4110].sites ([RFC4110]). 2.2. Acronyms and Abbreviations AS Autonomous System ASBR Autonomous System Border Router ATM Asynchronous Transfer Mode BGP Border Gateway Protocol DoS Denial of Service FEC Forwarding Equivalence Class GMPLS Generalized Multi-Protocol Label Switching ICI InterCarrier Interconnect IGP Interior Gateway Protocol IP Internet Protocol LDP Label Distribution Protocol L2 Layer 2 L3 Layer 3 LSP Label Switched Path LSR Label Switching Router MPLS MultiProtocol Label Switching MP-BGP Multi-Protocol BGP PCE PathCalculationComputation Element PPVPN Provider-Provisioned Vitual Private Network PSN Packet-Switched Network RR Route Reflector RSVP-TE Resource Reservation Protocol with Traffic Engineering Extensions SP Service Provider TTL Time-To-Live VPN Virtual Private Network 3. Security Reference Models This section defines a reference model for security in MPLS/GMPLS networks. A MPLS/GMPLS core network is defined here as the central network infrastructure (P and PE routers). A MPLS/GMPLS core network consists of one or more SP networks. All network elements in the core are under the operational control of one or more MPLS/GMPLSservice providers.Fang, et al. Informational 7 MPLS/GMPLS Security framework SPs. Even if the MPLS/GMPLS core is provided by severalservice providers,SPs, towards the end users it appears as a single zone of trust. However, when severalservice providers Fang, et al. Informational 7 MPLS/GMPLS Security framework February 2007 provideSPs togetheranprovide a MPLS/GMPLS core, each SP still needs to secure itself against the other SPs. A MPLS/GMPLS end user is a company,institutioninstitution, or residential client of the SP. This document defines eachMPLSMPLS/GMPLS core in a single domain to be a trusted zone. A primary concern is about security aspects that relate to breaches of security from the "outside" of a trusted zone to the "inside" of this zone. Figure 1 depicts the concept of trusted zones within the MPLS/GMPLS framework. /-------------\ +------------+ / \ +------------+ | MPLS/GMPLS +---/ \--------+ MPLS | | user | MPLS/GMPLS Core | user | | site +---\ /XXX-----+ site | +------------+ \ / XXX +------------+ \-------------/ | | | | | +------\ +--------/ "Internet" MPLS/GMPLS Core with user connections and Internet connection Figure 1: The MPLS/GMPLS trusted zonemodelmodel. The trusted zonedefinedis the MPLS/GMPLScore/networkcore in a single AS within a single Service Provider. The boundaries of a trust domain should be carefully defined when analyzing the security property of each individual network, e.g., the boundaries can be at the link termination, remote peers, areas, or quite commonly, ASes. Inprincipleprinciple, the trusted zones should be separate; however, typically MPLS core networks also offer Internet access, in which case a transit point (marked with "XXX" inthe figureFigure 1) is defined. In the case of MPLS/GMPLS inter-providerconnection,connections, the trusted zone ends at the ASBR (marked with "B" inthe figureFigure 2) of theconsidered AS/provider.given AS or provider. Fang, et al. Informational 8 MPLS/GMPLS Security framework A key requirement of MPLS and GMPLS networks is that the security of the trusted zone not be compromised by interconnecting the MPLS/GMPLS core infrastructure with anotherproviderprovider's core (MPLS/GMPLS or non-MPLS/GMPLS), the Internet, or enduser access.users. In addition, neighbors may be trusted or untrusted. Neighbors may be authorized or unauthorized. Even though a neighbor may be authorized for communication, it may not be trusted. For example,Fang, et al. Informational 8 MPLS/GMPLS Security framework February 2007when connecting with anotherproviderprovider's ASBRs to set up inter-AS LSPs, the other provider is consideredasan untrusted but authorized neighbor. +---------------+ +----------------+ | | | | | MPLS/GMPLS ASBR1----ASBR3 MPLS/GMPLS | CE1--PE1 Network | | Network PE2--CE2 | Provider A ASBR2----ASBR4 Provider B | | | | | +---------------+ +----------------+ For Provider A: Trusted Zone: Provider A MPSL/GMPLS network Trustedneighbor:neighbors: PE1, ASBR1, ASBR2 Authorized but untrusted neighbor: provider B Unauthorizedneighbor:neighbors: CE1, CE2 Figure 2. MPLS/GMPLS trusted zone and authorizedneighbor Security against threats that originate within the same trusted zone as their targets (for example, attacks from within the core network) is outside the scope of this document. Also outside the scope are allneighbor. All aspects of network securitywhich areindependent of whether a network is a MPLS/GMPLS network(forare out of scope. For example, attacks from the Internet to auseruser's web-serverwhich isconnected through the MPLS/GMPLS networkwillare notbeconsidered here, unless the way the MPLS/GMPLS network is provisioned could make a difference to the security of thisuser server).user's server. 4. Security Threats This section discusses the various network security threats that may endanger MPLS/GMPLS networks. The discussion is limited to those threats that are unique to MPLS/GMPLSnetworks,networks or that affect MPLS/GMPLS network in unique ways. A successful attack on a particular MPLS/GMPLS network or on aservice provider'sSP's MPLS/GMPLS infrastructure may cause one or more of the following ill effects: Fang, et al. Informational 9 MPLS/GMPLS Security framework - Observation, modification, or deletion ofprovider/usera provider's or user's data. - Replay ofprovider/usera provider's or user's data.Fang, et al. Informational 9 MPLS/GMPLS Security framework February 2007- Injection ofnon-authenticinauthentic data into aprovider/userprovider's or user's traffic stream. - Traffic pattern analysis onprovider/usera provider's or user's traffic. - Disruption ofprovider/usera provider's or user's connectivity. - Degradation ofprovidera provider's service quality. It is useful to consider that threats, whether malicious or accidental, may come from different categories of sources. For example they may come from: - Other users whose services are provided by the same MPLS/GMPLS core. - The MPLS/GMPLSservice providerSP or persons working for it. - Other persons who obtain physical access to a MPLS/GMPLSservice providerSP's site. - Other persons who use social engineering methods to influence the behavior ofservice providera SP's personnel. - Users of the MPLS/GMPLS network itself,i.e.e.g., intra-VPN threats. (Such threats are beyond the scope of this document.) -Others i.e.Others, e.g., attackers from the Internet at large. - Otherservice providerSPs in the case of MPLS/GMPLSInter-providerInter- provider connection. The core of the other provider may or may not be usingMPLS/GMPLS core.MPLS/GMPLS. - Those who create, deliver, install, and maintain software for network equipment. Given that security is generally acompromisetradeoff between expense and risk, it is also useful to consider the likelihood of different attacks occurring. There is at least a perceived difference in the likelihood of most types of attacks being successfully mounted in different environments, such as: - A MPLS/GMPLS core inter-connecting with another provider's core - A MPLS/GMPLS configuration transiting the public Internet Most types of attacks become easier to mount and hence more likely as the shared infrastructure via which service is provided expands from a singleservice providerSP to multiple cooperatingprovidersSPs to the global Internet. Attacks that may not be of sufficient likeliness to warrant concern in a closely controlled environment often merit defensive measures in broader, more open environments. In closed communities, it is often practical to deal with misbehavior after the fact: an employee can be disciplined, for example. Fang, et al. Informational 10 MPLS/GMPLS Security framework The following sections discuss specific types of exploits that threaten MPLS/GMPLS networks. 4.1. Attacks on the Control Plane This category encompasses attacks on the control structures operated by theservice providerSP with MPLS/GMPLS cores.Fang, et al. Informational 10 MPLS/GMPLS Security framework February 20074.1.1. LSP creation by an unauthorized element The unauthorized element can be a local CE or a router in another domain. An unauthorized element can generate MPLS signaling messages. At the least, this can result in extra control plane and forwarding state, and if successful, network bandwidth could be reserved unnecessarily. This may also result in theft of service and loss of revenue. 4.1.2. LSP message interception This threat might be accomplished by monitoring network traffic,althoughfor example, after a physical intrusion. Without physical intrusion, itwould requirecould be accomplished with an unauthorized software modification. Also many technologies such as terrestrail microwave, satellite, or free-space optical could be intercepted without physical intrusion. If successful, it could provide information leading to label spoofing attacks. It also raises confidentiality issues. 4.1.3. Attacks against RSVP-TE RSVP-TE, described in [RFC3209], is the control protocol used to set up GMPLS and traffic engineered MPLS tunnels. There are two major types of Denial of Dervice (DoS) attacks againstana MPLS domain based on RSVP-TE. The attacker may set up numerous unauthorizedLSPs,LSPs or may send a storm of RSVPmessages in a DoS attack.messages. It has been demonstrated that unprotected routers running RSVP can be effectively disabled by both types of DoS attacks. These attacks may even be combined, by using the unauthorized LSPs to transport additional RSVP (or other) messages across routers where they might otherwise be filtered out. RSVP attacks can be launched against adjacent routers at the border with the attacker, or against non-adjacent routers within the MPLS domain, if there is no effective mechanism to filter them out. Fang, et al. Informational 11 MPLS/GMPLS Security framework 4.1.4. Attacks against LDP LDP, described in [RFC3036], is the control protocol used to set upnon-TEMPLStunnels.tunnels without TE. There are two significant types of attack against LDP. An unauthorized network element can establishana LDP session by sending LDP Hello and LDP Init messages, leading to the potential setup ofana LSP, as well as accompanying LDP state table consumption. Even without successfullyestablishedestablishing LSPs, an attacker can launch a DoS attack in the form of a storm of LDP Hello messagesand/oror LDP TCP Syn messages, leading to high CPU utilization on the target router.Fang, et al. Informational 11 MPLS/GMPLS Security framework February 20074.1.5. Denial of Service Attacks on the Network Infrastructure DoS attacks could be accomplished throughana MPLS signaling storm, resulting in high CPU utilization and possibly leading to control plane resource starvation. Control planeDOSDoS attacks can be mounted specifically against the mechanisms theservice provider usesSPuses to provide various services, or against the general infrastructure of the serviceprovider e.g.provider, e.g., P routers or shared aspects of PE routers.(Attacks(An attack against the general infrastructureareis within the scope of this document only if the attackhappenscan occur in relation with the MPLS/GMPLSinfrastructure,infrastructure; otherwise is not a MPLS/GMPLS-specific issue.) The attacks described in the following sections may each have denial of service as one of their effects. OtherDOSDoS attacks are also possible. 4.1.6. Attacks on theService ProviderSP's MPLS/GMPLS EquipmentViavia Management Interfaces This includes unauthorized access toservice providera SP's infrastructure equipment, for example to reconfigure the equipment or to extract information (statistics, topology, etc.) pertaining to the network. 4.1.7. Social Engineering Attacks on theService ProviderSP's Infrastructure Attacks in which the service provider network is reconfigured or damaged, or in which confidential information is improperly disclosed, may be mountedthroughby manipulation ofservice providera SP's personnel. These types of attacks are MPLS/GMPLS-specific if they affect MPLS/GMPLS-serving mechanisms. Fang, et al. Informational 12 MPLS/GMPLS Security framework 4.1.8.Cross-connectionCross-Connection of TrafficBetweenbetween Users This refers to the eventwherein which expected isolation between separate users (who may be VPN users) is breached. This includes cases such as: - A site being connected into the "wrong"VPN.VPN - Traffic being replicated and sent to an unauthorizeduser.user - Two or more VPNs being improperly mergedtogether.together - A point-to-point VPN connecting the wrong twopoints. Fang, et al. Informational 12 MPLS/GMPLS Security framework February 2007points - Any packet or frame being improperly delivered outside the VPN to which itbelongs.belongs Mis-connection or cross-connection of VPNs may be caused by service provider or equipment vendor error, or by the malicious action of an attacker. The breach may be physical(e.g.(e.g., PE-CE links mis- connected) or logical(improper(e.g., improper device configuration). Anecdotal evidence suggests that the cross-connection threat is one of the largest security concerns of users (or would-be users). 4.1.9. AttacksAgainst Useragainst Routing Protocols This encompasses attacks against underlying routing protocols that are run by theservice providerSP and that directly support the MPLS/GMPLS core. (Attacks against the use of routing protocols for the distribution of backbone(non-VPN)routes are beyond the scope of this document.) Specific attacks against popular routing protocols have been widely studied and described in [Beard]. 4.1.10. Other Attacks on Control Traffic Besides routing and management protocols (covered separately in the previoussections)sections), a number of other control protocols may be directly involved in deliveringtheservices by the MPLS/GMPLS core. These include but may not be limited to: - MPLS signaling (LDP, RSVP-TE) discussed above in subsections 4.1.4 and 4.1.3 - PCE signaling - IPsec signaling(IKE)(IKE and IKEv2) - ICMP and ICMPv6 - L2TP - BGP-based membership discovery - Database-based membership discovery(e.g. RADIUS-based)(e.g., RADIUS) - Other protocols that may be important to the control infrastructure, e.g., DNS, LMP, NTP, SNMP, and GRE. Fang, et al. Informational 13 MPLS/GMPLS Security framework Attacks might subvert or disrupt the activities of these protocols, for example via impersonation orDOS attacks.DoS. 4.2. Attacks on the Data Plane This category encompasses attacks on theproviderprovider's or end user's data. Note that from the MPLS/GMPLS network end user's point of view, some of this might be control plane traffic, e.g. routing protocols running fromtheuser site A totheuser site B viaana L2 or L3connectionconnection, which may be some type of VPN.Fang, et al. Informational 13 MPLS/GMPLS Security framework February 20074.2.1. Unauthorized Observation of Data Traffic This refers to "sniffing"provider/endprovider or end user packets and examining their contents. This can result in exposure of confidential information. It can also be a first step in other attacks (described below) in which the recorded data is modified andre- inserted,re-inserted, orre-inserted as-is.simply replayed later. 4.2.2. Modification of Data Traffic This refers to modifying the contents of packets as they traverse the MPLS/GMPLS core. 4.2.3. Insertion ofNon-AuthenticInauthentic Data Traffic: Spoofing and ReplayThisSpoofing refers tothe insertion (or "spoofing") into thesending a user or inserting into a data stream packets that do notbelong there,belong, with the objective of having them accepted by the recipient as legitimate. Also included in this category is the insertion of copies of once-legitimate packets that have been recorded and replayed. 4.2.4. Unauthorized Deletion of Data Traffic This refers to causing packets to be discarded as they traverse the MPLS/GMPLS networks. This is a specific type of Denial of Service attack. 4.2.5. Unauthorized Traffic Pattern Analysis This refers to "sniffing"provider/userprovider or user packets and examining aspects or meta-aspects of them that may be visible even when the packets themselves are encrypted. An attacker might gain useful information based on the amount and timing of traffic, packet sizes, source and destination addresses, etc. For most users, this Fang, et al. Informational 14 MPLS/GMPLS Security framework type of attack is generally considered to be significantly less of a concern than the other types discussed in this section. 4.2.6. Denial of Service Attacks Denial of Service(DOS)(DoS) attacks are those in which an attacker attempts to disrupt or prevent the use of a service by its legitimate users. Taking network devices out of service, modifying their configuration, or overwhelming them with requests for service are several of the possible avenues forDOSDoS attack. Overwhelming the network with requests for service, otherwise known as a "resource exhaustion"DOSDoS attack, may target any resource inFang, et al. Informational 14 MPLS/GMPLS Security framework February 2007thenetwork e.g.network, e.g., link bandwidth, packet forwarding capacity, session capacity for various protocols, CPU power, table size, storage overflows, and so on.DOSDoS attacks of the resource exhaustion type can be mounted against the data plane of a particular provider orend-userend user by attempting to insert (spoofing) an overwhelming quantity ofnon-authenticinauthentic data into theprovider/endprovider or end user network from the outside of the trusted zone. Potential results might be to exhaust the bandwidth available to thatprovider/endprovider or end user or to overwhelm the cryptographic authentication mechanisms of the provider or end user. Data plane resource exhaustion attacks can also be mounted by overwhelming the service provider's general (MPLS/GMPLS- independent) infrastructure with traffic. These attacks on the general infrastructure are not usually a MPLS/GMPLS-specific issue, unless the attack is mounted by another MPLS/GMPLS network user from a privileged position.(E.g.(E.g., a MPLS/GMPLS network user might be able to monopolize network data plane resources and thus disrupt other users.) Many DoS attacks use amplification, whereby the attacker co-opts otherwise innocent parties to increase the effect of the attack. The attacker may, for example, send packets to a broadcast or multicast address with the spoofed source address of the victim, and all of the recipients may then respond to the victim. 5. Defensive Techniques for MPLS/GMPLS Networks The defensive techniques discussed in this document are intended to describe methods by which some security threats can be addressed. They are not intended as requirements for all MPLS/GMPLS implementations. The MPLS/GMPLS provider should determine the Fang, et al. Informational 15 MPLS/GMPLS Security framework applicability of these techniques to the provider's specific service offerings, and the end user may wish to assess the value of these techniques to the user's service requirements. The operational environment determines the security requirements. Therefore, protocol designers need to provide a full set of security services, which can be used where appropriate. The techniques discussed here include encryption, authentication, filtering, firewalls, access control, isolation, aggregation, and other techniques. Often, security is achieved by careful protocol design, rather than by adding a security method. For example, one method of mitigating DoS attacks is to make sure that innocent parties cannot be used to amplify the attack. Security works better when it is "designed in" rather than "added on." Nothing is ever 100% secure. Defense therefore involves protecting against those attacks that are most likely to occurand/oror that have the mostdiredirect consequences if successful. For those attacks that are protected against, absolute protection is seldom achievable; more often it is sufficient just to make the cost of a successful attack greater than what the adversary will be willing or able to expend. Successfully defending against an attack does not necessarily mean the attack must be prevented from happening or from reaching its target. In many cases the network can instead be designed to withstand the attack. For example, the introduction ofnon- authenticinauthentic packets could be defended against by preventing theirFang, et al. Informational 15 MPLS/GMPLS Security framework February 2007introduction in the first place, or by making it possible to identify and eliminate them before delivery to the MPLS/GMPLS user's system. The latter is frequently a much easier task. 5.1. Authentication To prevent security issues arising from some Denial-of-Service attacks or from malicious or accidental misconfiguration, it is critical that devices in the MPLS/GMPLS should only accept connections or control messages from valid sources. Authentication refers to methods to ensure that message sources are properly identified by the MPLS/GMPLS devices with which they communicate. This section focuses on identifying the scenarios in which sender authentication is required and recommends authentication mechanisms for these scenarios. Fang, et al. Informational 16 MPLS/GMPLS Security framework Cryptographic techniques (authentication, integrity, and encryption) do not protect against some types of denial of service attacks, specifically resource exhaustion attacks based on CPU or bandwidth exhaustion. In fact, the processing required to decrypt or check authentication may, in the case of software crypto, in some cases increase the effect of these resource exhaustion attacks. With a hardware crypto accelerator, attack packets can be dropped at line speed without a cost of software cycles. Cryptographic techniques may, however, be useful against resource exhaustion attacks based on exhaustion of state information (e.g., TCP SYN attacks). The MPLS user plane, as presently defined, is not amenable to source authentication as there are no source identifiers in the MPLS packet to authenticate. The MPLS label is only locally meaningful, and it identifies a downstream semantic rather than an upstream source. When the MPLS payload carries identifiers that may be authenticated (e.g., IP packets), authentication may be carried out at the client level, but this does not help the MPLS SP, as these client identifiers belong to an external, untrusted network. 5.1.1. Management System Authentication Management system authentication includes the authentication of a PE to a centrally-managed network management or directory server when directory-based "auto-discovery" is used. It also includes authentication of a CE to the configuration server, when a configuration server system is used. 5.1.2. Peer-to-Peer Authentication Peer-to-peer authentication includes peer authentication for network control protocols (e.g., LDP, BGP, etc.), and other peer authentication (i.e., authentication of one IPsec security gateway by another). 5.1.3. Cryptographic techniques for authenticating identity Cryptographic techniques offer several mechanisms for authenticating the identity of devices or individuals. These Fang, et al. Informational 17 MPLS/GMPLS Security framework include the use of shared secret keys, one-time keys generated by accessory devices or software, user-ID and password pairs, and a range of public-private key systems. Another approach is to use a hierarchical Certification Authority system to provide digital certificates. This section describes or provides references to the specific cryptographic approaches for authenticating identity. These approaches provide secure mechanisms for most of the authentication scenarios required in securing a MPLS/GMPLS network. 5.2. Cryptographic techniques MPLS/GMPLS defenses against a wide variety of attacks can be enhanced by the proper application of cryptographic techniques. These are the same cryptographic techniqueswhichthat are applicable to general network communications. In general, these techniques can provide confidentiality (encryption) of communication between devices,authentication ofcan authenticate the identities of the devices, and can ensure that it will be detected if the data being communicated is changed during transit. Several aspects of authentication are addressed in some detail in a separate "Authentication" section.Encryption addsCryptographic methods add complexity to aservice,service andthus it may not be a standard offering within every user service. There arethus, for a fewreasons why encryptionreasons, may not bea standard offering withinthe most practical soloution in everyuser service. Encryptioncase. Cryptography adds an additional computational burden tothe devices performing encryption and decryption. Thisdevices, which may reduce the number of user connectionswhichthat can be handled on a device or otherwise reduce the capacity of the device, potentially driving up the provider's costs. Typically, configuring encryption services on devices adds to the complexity ofthe devicetheir configuration and addsincrementallabor cost. Some key management system is usually needed. Packet sizes are typically increased when the packets aresecured,encrypted or have integrity checks or replay counters added, increasing the network traffic load and adding to the likelihood of packet fragmentation with its increased overhead. (This packet length increase can often be mitigated to some extent by data compression techniques, but at the expense of additional computational burden.) Finally, some providers may employ enough other defensive techniques, such as physical isolation orfiltering/firewallfiltering and firewall techniques, that they may not perceive additional benefit from encryption techniques. Users may wish to provide confidentiality end to end. Generally, encrypting for confidentiality must be accompanied with cryptographic integrity checks to prevent certain active attacks Fang, et al. Informational 18 MPLS/GMPLS Security framework against the encrypted communications. On today's processors, encryption and integrity checks run extremely quickly, but key management may be more demanding in terms of both computational and administrative overhead. The trust model among the MPLS/GMPLS user, the MPLS/GMPLS provider, and other parts of the network is akeymajor element in determining the applicability ofencryptioncryptographic protection for any specific MPLS/GMPLS implementation. In particular, it determines whereencryptioncryptographic protection should be applied: - If the data path between the user's site and the provider's PE is not trusted, thenencryptionit may be used on the PE-CE link. - If some part of the backbone network is not trusted, particularly in implementations where traffic may travelFang, et al. Informational 16 MPLS/GMPLS Security framework February 2007across the Internet or multipleproviderproviders' networks, then the PE-PE traffic may beencrypted.cryptographically protected. One also should consider cases where L1 technology may be vulnerable to eavesdropping. - If the user does not trust any zone outside of its premises, it may require end-to-end or CE-CEencryption service.cryptotographic protection. Thisservicefits within the scope of this MPLS/GMPLS security framework when the CE is provisioned by the MPLS/GMPLS provider. - If the user requires remote access toaits site from a system at a locationwhichthat is not a customer location (for example, access by a traveler) there may be a requirement forencryptingcryptographically protecting the traffic between that system and an access point oratacustomercustomer's site. If the MPLS/GMPLS providerprovidessupplies the access point, then the customer must cooperate with the provider to handle the access control services for the remote users. These access control services are usuallyimplemented using encryption,protected cryptographically, as well. Access control usually starts with authentication of the entity. If cryptographic services are part of the scenario, then it is important to bind the authentication to the key management. Otherwise the protocol is vulnerable to being hijacked between the authentication and key management. Although CE-CEencryption providescryptographic protection can provide integrity and confidentiality againstthird- party interception,third parties, if the MPLS/GMPLS provider has complete management control over the CE (encryption) devices, then it may be possible for the provider to gain access to the user's traffic or internal network. Encryption devicescancould potentially beconfiguredreconfigured to use null encryption, bypassencryptionFang, et al. Informational 19 MPLS/GMPLS Security framework cryptographic processing altogether, reveal internal congiguration, or provide some means of sniffing or diverting unencrypted traffic. Thus an implementation using CE-CE encryption needs to consider the trust relationship between the MPLS/GMPLS user and provider. MPLS/GMPLS users and providers may wish to negotiate a service level agreement (SLA) for CE-CE encryption thatwill provideprovides an acceptable demarcation of responsibilities for management ofencryptioncryptographic protection on the CE devices. The demarcation may also be affected by the capabilities of the CE devices. For example, the CE might support some partitioning of management, a configuration lock-down ability, orallow both partiesshared capability to verify the configuration. In general, the MPLS/GMPLS user needs to have a fairly high level of trust that the MPLS/GMPLS provider will properly provision and manage the CE devices, if the managed CE-CE model is used.5.1.1.5.2.1. IPsec in MPLS/GMPLS IPsec [RFC4301] [RFC4302][RFC4305][RFC4835] [RFC4306] [RFC2411] is the security protocol of choice for encryption at the IP layer (Layer 3). IPsec provides robust security for IP traffic between pairs of devices. Non-IP traffic such as IS-IS routing must be converted to IP(e.g.(e.g., by encapsulation) in order toexploituse IPsec.Fang, et al. Informational 17 MPLS/GMPLS Security framework February 2007In the MPLS/GMPLS model, IPsec can be employed to protect IP traffic between PEs, between a PE and a CE, or from CE to CE. CE- to-CE IPsec may be employed in either a provider-provisioned or a user-provisioned model. Likewise,encryptionIPsec protection of datawhich isperformed within the user's site is outside the scope of this document,sincebecause it is simply handled as user data by the MPLS/GMPLS core. However, if the SP performs compression, pre- encryption will have a major effect on that operation. IPsec does not itself specify an encryption algorithm. It can use a variety ofencryption algorithms,integrity or confidentiality algorithms (or even combined integrity and confidentiality algorithms), with various key lengths, such as AESencryption.encryption or AES message integrity checks. There are trade-offs between key length, computational burden, and the level of security of the encryption. A full discussion of these trade-offs is beyond the scope of this document. In practice, any currently recommended IPsecencryptionprotection offers enough security tosubstantiallyreduce the likelihood of its being directly targeted by anattacker;attacker substantially; other weaker links in the chain of security are likely to be attacked first. MPLS/GMPLS users may wish to use a Service Level Agreement (SLA) Fang, et al. Informational 20 MPLS/GMPLS Security framework specifying theService Provider'sSP's responsibility for ensuring data integrity and confidentiality, rather than analyzing the specific encryption techniques used in the MPLS/GMPLS service. Encryption algorithms generally come with two parameters: mode such as Cipher Block Chaining and key length such as AES-192. (This should not be confused with two other senses in which the word "mode" is used: IPsec itself can be used in Tunnel Mode or Transport Mode, and IKE [version 1] uses Main Mode, Aggressive Mode, or Quick Mode). It should be stressed that IPsec encryption without an integrity check is a state of sin. For many of the MPLS/GMPLS provider's network control messages and some user requirements, cryptographic authentication of messages without encryption of the contents of the message may provideacceptableappropriate security. Using IPsec, authentication of messages is provided by the Authentication Header (AH) or through the use of the Encapsulating Security Protocol (ESP) withauthentication only.NULL encryption. Where control messages requireauthenticationintegrity but do not use IPsec,thenother cryptographic authentication methods are often available. Message authentication methods currently considered to be secure are based on hashed message authentication codes (HMAC) [RFC2104] implemented with a secure hash algorithm such as Secure Hash Algorithm 1 (SHA-1) [RFC3174].The currently recommendedNo attacks against HMAC SHA-1 are likely to play out in the near future, but it is possible that people will soon find SHA-1 collisions. Thus, it is important that mechanisms be designed to be flexible about the choice of hash functions and message integrity checks. Also, many of these mechanisms do not include a convenient way to manage and update keys. A mechanism to provide a combination of confidentiality, data origin authentication, and connectionless integrity is the use of AES in CCM (Counter with CBC-MAC) mode(AES-CCM) [AES-CCM],(RFC 4309) [RFC4309], with an explicit initialization vector (IV), as the IPsec ESP.MPLS/GMPLSRecently, GCM is rapidly replacing CCM as the preferred method: [RFC4103]. MPLS and GMPLS, which provide differentiated services based on traffictypetype, may encounter some conflicts with IPsec encryption of traffic.SinceBecause encryption hides the content of the packets, it may not be possible to differentiate the encrypted traffic in the same manner as unencrypted traffic. Although DiffServ markings are copied toFang, et al. Informational 18 MPLS/GMPLS Security framework February 2007the IPsec header and can provide some differentiation, not all traffic types can be accommodated by this mechanism.5.1.2.Using IPsec without IKE or IKEv2 (the better choice) is not advisable. IKEv2 provides IPsec Security Association creation and management, entity authentication, key agreement, and key update. It works with a variety of authentication methods including pre-shared keys, Fang, et al. Informational 21 MPLS/GMPLS Security framework public key certificates, and EAP. If DoS attacks against IKEv2 are considered an important threat to mitigate, the cookie-based anti- spoofing feature of IKEv2 should be used. IKEv2 has its own set of cryptographic methods, but any of the default suites specified in [RFC4308] or [RFC4869] provides more than adequate security. 5.2.2. Encryption for device configuration and management For configuration and management of MPLS/GMPLS devices, encryption and authentication of the management connection at a level comparable to that provided by IPsec is desirable. Several methods of transporting MPLS/GMPLS device management traffic offer security and confidentiality. - Secure Shell (SSH) offers protection for TELNET [STD-8] or terminal-like connections to allow device configuration. -SNMP v3SNMPv3 [STD62] provides encrypted and authenticated protection for SNMP-managed devices. - Transport Layer Security (TLS) [RFC4346] and the closely-related Secure Sockets Layer (SSL) are widely used for securing HTTP- based communication, and thus can provide support for most XML- and SOAP-based device management approaches. -As ofSince 2004, thereishas been extensive work proceeding in several organizations (OASIS, W3C, WS-I, and others) on securing device management traffic within a "Web Services" framework, using a wide variety of security models, and providing support for multiple security token formats, multiple trust domains, multiple signature formats, and multiple encryption technologies. - IPsec provides the services withsecurityintegrity and confidentiality at the network layer. With regards to device management, its current use is primarily focused on in-band management of user- managed IPsec gateway devices.5.1.3.- There are recent work in ISMS WG (Integrated Security Model for SNMP Working Group) to define how to use SSH to secure SNMP, due to the limited deployment of SNMPv3; and the possibility of using Kerberos, particularly for interfaces like TELNET, where client code exists. CryptographictechniquesTechniques for MPLS Pseudowires5.1.4.5.2.3. 5.1.3 Security Considerations for MPLS Pseudowires In addition to IP traffic, MPLS networks may be used to transport other services such as Ethernet, ATM,frame relay,Frame Relay, and TDM. This is Fang, et al. Informational 22 MPLS/GMPLS Security framework done by setting up pseudowires (PWs) that tunnel the native service through the MPLS core by encapsulating at the edges. The PWE architecture is defined in [RFC3985].Fang, et al. Informational 19 MPLS/GMPLS Security framework February 2007PW tunnels may be set up using the PWE control protocol based on LDP [RFC4447], and thus security considerations for LDP will most likely be applicable to the PWE3 control protocol as well. PW user packets contain at least one MPLS label (the PW label) and may contain one or more MPLS tunnel labels. After the label stack there is a four-byte control word (which is optional for some PW types), followed by the native service payload. It must be stressed that encapsulation of MPLS PW packets in IP for the purpose of enabling use of IPsec mechanisms is not a valid option. The PW client traffic may be secured by use of mechanisms beyond the scope of this document.5.1.5. End-to-end vs. hop-by-hop encryption tradeoffs5.2.4. End-to-End versus Hop-by-Hop Protection Tradeoffs in MPLS/GMPLS In MPLS/GMPLS,encryptioncryptographic protection could potentially be applied to the MPLS/GMPLS traffic at several different places. This section discusses some of the tradeoffs in implementing encryption in several different connection topologies among different devices within a MPLS/GMPLS network.EncryptionCryptographic protection typically involves a pair of deviceswhich encryptthat protect the traffic passing between them. The devices may be directly connected (over a single "hop"), orthere may beintervening deviceswhichmay transport theencryptedprotected traffic between the pair of devices. The extreme cases involve usingencryptionprotection between every adjacent pair of devices along a given path (hop-by-hop), or usingencryptionprotection only between the end devices along a given path (end-to- end). To keep this discussion within the scope of this document, the latter ("end-to-end") case considered here is CE-to-CE rather than fully end-to-end. Figure 3 depicts a simplified topology showing the Customer Edge (CE) devices, the Provider Edge (PE) devices, and a variable number (three are shown) of Provider core (P)devicesdevices, which might be present along the path between two sites in a singleVPN,VPN operated by a single service provider (SP). Fang, et al. Informational 23 MPLS/GMPLS Security framework Site_1---CE---PE---P---P---P---PE---CE---Site_2 Figure 3: Simplified topology traversing through MPLS/GMPLScore Fang, et al. Informational 20 MPLS/GMPLS Security framework February 2007core. Within this simplified topology, and assuming that the P devices are notto beinvolved withencryption, there arecryptographic protection, fourbasicbasic, feasible configurations exist forimplementing encryption onprotecting connections among the devices: 1) Site-to-site (CE-to-CE) -Encryption can be configuredApply confidentiality or integrity services between the two CE devices, so that traffic will beencryptedprotected throughout the SP's network. 2) Provider edge-to-edge (PE-to-PE) -Encryption can be configuredApply confidentiality or integrity services between the two PE devices.UnencryptedUnprotected traffic is received at one PE from the customer's CE, then it isencryptedprotected for transmission through the SP's network to the other PE,whereand finally it is decrypted or checked for integrity and sent to the other CE. 3) Access link (CE-to-PE) -Encryption can be configuredApply confidentiality or integrity services between the CE andPE,PE on each side(oror on only oneside).side. 4) Configurations 2 and 3 above can also be combined, withencryptionconfidentiality or integrity running from CE to PE, then PE to PE, and then PE to CE. Among the four feasible configurations, key tradeoffs in considering encryption include: - Vulnerability to link eavesdropping or tampering - assuming an attacker can observetheor modify data in transit on the links, would it be protected by encryption? - Vulnerability to device compromise - assuming an attacker can get access to a device (or freely alter its configuration), would the data be protected? - Complexity of device configuration and management - given the number of sites per VPN customer as Nce and the number of PEs participating in a given VPN as Npe, how many device configurations need to be created or maintained, and how do those configurations scale? Fang, et al. Informational 24 MPLS/GMPLS Security framework - Processing load on devices - how manyencryption or decryptioncryptographic operations must bedoneperformed givenPN packets? - Thisinfluencesraises considerations of device capacity and perhaps end-to-end delay. - Ability of the SP to provide enhanced services (QoS, firewall, intrusion detection, etc.) - Can the SP inspect the datain orderto provide these services?Fang, et al. Informational 21 MPLS/GMPLS Security framework February 2007These tradeoffs are discussed for each configuration, below: 1) Site-to-site (CE-to-CE) Link eavesdropping or tampering - protected on all links Device compromise - vulnerable to CE compromise Complexity - single administration, responsible for one device per site (Nce devices), but overall configuration per VPN scales asNce**2Nce**2. Though the complexity may be reduced: 1) In practice, as Nce grows, the number of VPNs falls off from being a full clique; 2) If the CEs run an automated key management protocol, then they should be able to set up and tear down secured VPNs without any intervention Processing load - on each of two CEs, each packet is eitherencryptedcryptographically processed (2P), though the protection may be "integrity check only" ordecrypted (2P)"integrity check plus encryption." Enhanced services - severely limited; typically only Diffserv markings are visible to the SP, allowing some QoS services 2) Provider edge-to-edge (PE-to-PE) Link eavesdropping or tampering - vulnerable on CE-PE links; protected on SP's network links Device compromise - vulnerable to CE or PE compromise Complexity - single administration, Npe devices to configure. (Multiple sites may share a PE device so Npe is typically much less than Nce.) Scalability of the overall configuration depends on the PPVPN type: If theencryptioncryptographic protection is separate per VPN context, it scales as Npe**2 per customer VPN. Ifthe encryptionit is per-PE, it scales as Npe**2 for all customer VPNs combined. Processing load - on each of two PEs, each packet iseither encrypted or decrypted (2P)cryptographically processed (2P). Note that this 2P is a different 2P from case (1), because only PEs are in consideration here. Enhanced services - full; SP can apply any enhancements based on detailed view of traffic 3) Access link (CE-to-PE) Fang, et al. Informational 25 MPLS/GMPLS Security framework Link eavesdropping or tampering - protected on CE-PE link; vulnerable on SP's network links Device compromise - vulnerable to CE or PE compromise Complexity - two administrations (customer and SP) with device configuration on each side (Nce + Npe devices to configure) butsincebecause there is no mesh the overall configuration scales as Nce. Processing load - on each of two CEs, each packet iseither encrypted or decrypted,cryptographically processed, plus on each of two PEs, each packet iseither encrypted or decryptedcryptographically processed (4P) Enhanced services - full; SP can apply any enhancements based on detailed view of traffic 4) Combined Access link and PE-to-PE (essentially hop-by-hop) Link eavesdropping or tampering - protected on all linksFang, et al. Informational 22 MPLS/GMPLS Security framework February 2007Device compromise - vulnerable to CE or PE compromise Complexity - two administrations (customer and SP) with device configuration on each side (Nce + Npe devices to configure). Scalability of the overall configuration depends on the PPVPN type: If theencryptioncryptographic processing is separate per VPN context, it scales as Npe**2 per customer VPN. Ifthe encryptionit isper-PE,per- PE, it scales as Npe**2 for all customer VPNs combined. Processing load - on each of two CEs, each packet iseither encrypted or decrypted,cryptographically processed, plus on each of two PEs, each packet isboth encrypted and decryptedcryptographically processed twice (6P) Enhanced services - full; SP can apply any enhancements based on detailed view of traffic Given the tradeoffs discussed above, a few conclusions can be made: - Configurations 2 and 3 are subsets of 4 that may be appropriate alternatives to 4 under certain threat models; the remainder of these conclusions compare 1 (CE-to-CE)vs.versus 4 (combined access links and PE-to-PE). - If protection from link eavesdropping or tampering is all that ismostimportant, then configurations 1 and 4 are equivalent. - If protection from device compromise is most important and the threat is to the CE devices, both cases are equivalent; if the threat is to the PE devices, configuration 1 isbest.better. - If reducing complexity is most important, and the size of the network isverysmall, configuration 1 isthe best.better. Otherwise configuration 4 isthe bestbetter because rather than a mesh of CE devices it requires a smaller mesh of PE devices.AlsoAlso, under some PPVPN Fang, et al. Informational 26 MPLS/GMPLS Security framework approaches the scaling of 4 is further improved by sharing the same PE-PE mesh across all VPN contexts. The scaling advantage of 4 may be increased or decreased in any given situation if the CE devices are simpler to configure than the PE devices, orvice- versa.vice-versa. - If the overall processing load is a key factor, then 1 isbest.better, unless the PEs come with a hardware encryption accelerator and the CEs do not. - If the availability of enhanced services support from the SP is most important, then 4 is best. As a quick overall conclusion, CE-to-CEencryption provides greaterprotection is better against devicecompromisecompromise, but this comes at the cost of enhanced services and at the cost of operational complexity due to the Order(n**2) scaling of a larger mesh.Fang, et al. Informational 23 MPLS/GMPLS Security framework February 2007This analysis of site-to-site vs. hop-by-hopencryptiontradeoffs does not explicitly include cases of multiple providers cooperating to provide a PPVPN service, public Internet VPN connectivity, or remote access VPN service, but many of the tradeoffs will be similar.5.2. AuthenticationInorder to prevent security issues from some Denial-of-Service attacks or from malicious misconfiguration, it is critical that devices in the MPLS/GMPLS should only accept connections or control messages from valid sources. Authentication refers to methodsaddition toensure that message sources are properly identified bytheMPLS/GMPLS devices with which they communicate. This section focuses on identifying the scenarios in which sender authentication is required, and recommends authentication mechanisms for these scenarios. Cryptographic techniques (authentication and encryption) do not protect against some types of denial of service attacks, specifically resource exhaustion attacks based on CPU or bandwidth exhaustion. In fact, the processing required to decrypt and/or check authentication may in some cases increasesimplified models, theeffect of these resource exhaustion attacks. Cryptographic techniques may however,following should also beuseful against resource exhaustion attacks based on exhaustion of state information (e.g., TCP SYN attacks). The MPLS user plane, as presently defined, is not amenable to source authentication as thereconsidered: - There areno source identifiers in the MPLS packetreasons, perhaps, toauthenticate. The MPLS label is only locally meaningful, and identifiesprotect adownstream semantic rather than an upstream source. When the MPLS payload carries identifiers thatspecific P-to-P or PE- to-P. - There may beauthenticated (e.g., IP packets), authenticationreasons to do multiple encryptions over certain segments. One may becarried out at the client level, but this does not help the MPLS service provider as these client identifiers belong tousing anexternal non-trusted network. 5.2.1. Management System Authentication Management system authentication includes the authentication of a PEencrypted wireless link under our IPsec VPN to access acentrally-managed directory server, when directory-based Fang, et al. Informational 24 MPLS/GMPLS Security framework February 2007 "auto-discovery" is used.SSL-secured web site to download encrypted email attachments: four layers.) - Italso includes authentication of a CEmay be that, for example, cryptographic integrity checks are applied end tothe configuration server, whenend, and confidentiality over aconfiguration server system is used. 5.2.2. Peer-to-peer Authentication Peer-to-peer authentication includes peer authenticationshorter span. - Different cryptographic protection may be required fornetworkcontrol protocols(e.g. LDP, BGP, etc.), and other peer authentication (i.e. authentication of one IPsec security gateway by another). 5.2.3. Cryptographic techniques for authenticating identity Cryptographic techniques offer several mechanisms for authenticating the identity of devices or individuals. These include the use of shared secret keys, one-time keys generated by accessory devices or software, user-IDandpassword pairs, and a range of public-private key systems. Another approach is to use a hierarchical Certificate Authority systemdata traffic. - Attention needs toprovide digital certificates. This section describes or provides referencesbe given to how auxiliary traffic is protected, e.g., thespecific cryptographic approaches for authenticating identity. These approaches provide secure mechanisms for most of the authentication scenarios required in securing a MPLS/GMPLS network.ICMPv6 packets that flow back during PMTU discovery, among other examples. 5.3. Access Control techniques Access control techniques include packet-by-packet or packet-flow- by-packet-flow access control by means of filters and firewalls, as well as by means of admitting a "session" for acontrol/signaling/managementcontrol, signaling, or management protocol. Enforcement of access control by isolated infrastructure addresses is discussed in another section of this document. Fang, et al. Informational 27 MPLS/GMPLS Security framework In this document, we distinguish between filtering and firewalls based primarily on the direction of traffic flow. We define filtering as being applicable to unidirectional traffic, while a firewall can analyze and control both sides of a conversation.There areThe definition has two significantcorollaries of this definition:corollaries: - Routing or traffic flow symmetry: A firewall typically requires routing symmetry, which is usually enforced by locating a firewall where the network topology assures that both sides of aFang, et al. Informational 25 MPLS/GMPLS Security framework February 2007conversation will pass through the firewall. A filter can operate upon traffic flowing in one direction, without considering traffic in the reverse direction. Beware that this concept could result in a single point of failure. - Statefulness:SinceBecause it receives both sides of a conversation, a firewall may be able to interpret a significant amount of information concerning the state of thatconversation,conversation and use this information to control access. A filter can maintain some limited state information on a unidirectional flow of packets, but cannot determine the state of the bi-directional conversation as precisely as a firewall. 5.3.1. Filtering It is relatively common for routers to filter data packets. That is, routers can look for particular values in certain fields of the IP or higher level (e.g., TCP or UDP) headers. Packets whichmatchmatching the criteria associated with a particular filter may either be discarded or given special treatment. Today, not only routers, most end hosts today have filters and every instance of IPsec is also a filter [RFC4301]. In discussing filters, it is useful to separate the Filter Characteristicswhichthat may be used to determine whether a packet matches a filter from the Packet Actionswhich areapplied to those packets whichmatchmatching a particular filter. o Filter Characteristics Filter characteristics or rules are used to determine whether a particular packet or set of packets matches a particular filter. In many cases filter characteristics may be stateless. A stateless filteris one whichdetermines whether a particular packet matches a filter based solely on the filter definition, normal forwarding information (such as the next hop for a packet), and thecharacteristicscontents of that individual packet. Typically stateless filters may consider the incoming and outgoing logical or physical interface, information in the IP header, and information in higher layer Fang, et al. Informational 28 MPLS/GMPLS Security framework headers such as the TCP or UDP header. Information in the IP header to be considered may for example include source and destination IPaddress,addresses, Protocol field, Fragment Offset, and TOSfield.field in IPv4, Next Header, Extension Headers, Flow label, etc. in IPv6. Filters also may consider fields in the TCP or UDP header such as the Portfields as well asfields, the SYN field in the TCPheader.header, as well as ICMP and ICMPv6 type. Stateful filtering maintains packet-specific state information, to aid in determining whether a filter has been met. For example, a device might apply stateless filters to the first fragment of a fragmented IP packet. If the filter matches, then the data unit ID may be remembered and other fragments of the same packet may then be considered to match the same filter. Stateful filtering is moreFang, et al. Informational 26 MPLS/GMPLS Security framework February 2007commonly done in firewalls, although firewall technology may be added to routers. Data unit ID can also be Fragmentation Extension Header in IPv6. o Actions based on Filter Results If a packet, or a series of packets, matches a specific filter, thenthere area variety of actions which may be taken based on thatfiltermatch. Examples of such actions include: - Discard In manycasescases, filtersmay beare set to catch certain undesirable packets. Examples may include packets with forged or invalid source addresses, packetswhichthat are part of a DOS orDDOSDistributed DoS (DDOS) attack, or packets which are trying to access unallowed resourceswhich are not permitted(such as network management packets from an unauthorized source). Where such filters are activated, it is common tosilentlydiscard the packet or set of packets matching thefilter.filter silently. The discarded packets may of course also be countedand/oror logged. - Set CoS A filter may be used to set the Class of Service associated with the packet. - Count packetsand/oror bytes - Rate Limit In some cases the set of packetswhich matchmatching a particular filter may be limited to a specified bandwidth. In thiscasecase, packetsand/oror bytes would be counted, and would be forwarded normally up to the specified limit. Excess packets may bediscarded,discarded or may be marked Fang, et al. Informational 29 MPLS/GMPLS Security framework (for example by setting a "discard eligible" bit in the IP ToS field or the MPLS EXP field). - Forward and Copy It is useful in some cases to forward some set of packets normally, buttoalso to send a copy to a specified other address or interface. For example, this may be used to implement a lawful interceptcapability,capability or to feed selected packets to an Intrusion Detection System. o Other Issues related to Use of Packet FiltersThere may be a very wide variation in theFiltering performanceimpact of filtering. Thismayoccur both duevary widely according todifferences between Fang, et al. Informational 27 MPLS/GMPLS Security framework February 2007 implementations,implementation andalso due to differences between types or numbers of filters deployed. For filtering to be useful,theperformancetypes and number ofthe equipment has to berules. Without acceptablein the presence of filters.performance, filtering is not useful. The precise definition of "acceptable" may vary fromservice providerSP toservice provider,SP, and may depend upon the intended use of the filters. For example, for some uses a filter may be turned on all the timein orderto set CoS, to prevent an attack, or to mitigate the effect of a possible future attack. In this case it is likely that theservice providerSP will want the filter to have minimal or no impact on performance. In other cases, a filter may be turned on only in response to a major attack (such as a majorDDOSDDoS attack). In this case a greater performance impact may be acceptable to some service providers. A key consideration with the use of packet filters is that they can provide few options for filtering packets carrying encrypted data.SinceBecause the data itself is not accessible, only packet header information or other unencrypted fields can be used for filtering. 5.3.2. Firewalls Firewalls provide a mechanism for control over traffic passing between different trusted zones in the MPLS/GMPLS model, or between a trusted zone and an untrusted zone. Firewalls typically provide much more functionality than filters,sincebecause they may be able to apply detailed analysis and logical functions to flows, and not just to individual packets. They may offer a variety of complex services, such as threshold-driven denial-of-service attack protection, virus scanning, acting as a TCP connection proxy, etc. As with other access control techniques, the value of firewalls depends on a clear understanding of the topologies of the MPLS/GMPLS core network, the user networks, and the threat model. Their effectiveness depends on a topology with a clearly defined inside (secure) and outside (not secure). Fang, et al. Informational 30 MPLS/GMPLS Security framework Firewalls may be applied to help protect MPLS/GMPLS core network functions from attacks originating from the Internet or from MPLS/GMPLS user sites, but typically other defensive techniques will be used for this purpose. Where firewalls are employed as a service to protect user VPN sites from the Internet, different VPN users, and even different sites of a single VPN user, may have varying firewall requirements. TheFang, et al. Informational 28 MPLS/GMPLS Security framework February 2007overall PPVPN logical and physical topology, along with the capabilities of the devices implementing the firewall services,will havehas a significant effect on the feasibility and manageability of such varied firewall service offerings. Another consideration with the use of firewalls is that they can provide few options for handling packets carrying encrypted data.SinceBecause the data itself is not accessible, only packet header information, other unencrypted fields, or analysis of the flow of encrypted packets can be used for making decisions on accepting or rejecting encrypted traffic. Two approaches are to move the firewall outside of the encrypted part of the path or to register and pre-approve the encrypted session with the firewall. Handling DoS attacks has become increasingly important. Useful guidelines include the following: 1. Perform ingress filtering everywhere. Upstream prevention is better. 2. Be able to filter DoS attack packets at line speed. 3. Do not allow oneself to amplify attacks. 4. Continue processing legitimate traffic. Over provide for heavy loads. Use diverse locations, technologies, etc. 5.3.3. Access Control to management interfaces Most of the security issues related to management interfaces can be addressed through the use of authentication techniques as described in the section on authentication. However, additional security may be provided by controlling access to management interfaces in other ways. The Optical Internetworking Forum has done good work on protecting such interfaces with TLS, SSH, Kerberos, IPsec, WSS, etc. See OIF- SMI-01.0 "Security for Management Interfaces to Network Elements" [OIF-SMI-01.0], and "Addendum to the Security for Management Interfaces to Network Elements" [OIF-SMI-02.1]. See also the work in the ISMS WG. Fang, et al. Informational 31 MPLS/GMPLS Security framework Management interfaces, especially console ports on MPLS/GMPLS devices, may be configured so they are only accessible out-of-band, through a system which is physicallyand/oror logically separated from the rest of the MPLS/GMPLS infrastructure. Where management interfaces are accessible in-band within the MPLS/GMPLS domain, filtering or firewalling techniques can be used to restrict unauthorized in-band traffic from having access to management interfaces. Depending on device capabilities, these filtering or firewalling techniques can be configured either on other devices through which the traffic might pass, or on the individual MPLS/GMPLS devices themselves. 5.4. Use of Isolated Infrastructure One way to protect the infrastructure used for support of MPLS/GMPLS is to separate the resources for support of MPLS/GMPLS services from the resources used for other purposes (such as support of Internet services). In some cases this maymakeuseofphysically separate equipment for VPN services, or even a physically separate network. For example, PE-based L3 VPNs may be run on a separate backbone not connected to the Internet, or may make use of separate edge routers from those used to support Internet service. Private IP addressesFang, et al. Informational 29 MPLS/GMPLS Security framework February 2007(local to the provider and non-routable over the Internet) are sometimes used to provide additional separation. 5.5. Use of Aggregated Infrastructure Ingeneralgeneral, it is not feasible to use a completely separate set of resources for support of each service. In fact, one of the main reasons for MPLS/GMPLS enabled services is to allow sharing of resources between multiple users, including multiple VPNs, etc.ThusThus, even if certain services make use of a separate network from Internet services, nonetheless there will still be multiple MPLS/GMPLS users sharing the same network resources. In some cases MPLS/GMPLS services will share the use of network resources with Internet services or other services. It is therefore important for MPLS/GMPLS services to provide protection betweenresource utilizationresources used by differentusers.parties. Thus a well-behaved MPLS/GMPLS user should be protected from possible misbehavior by other users. This requires that limits are placed on Fang, et al. Informational 32 MPLS/GMPLS Security framework the amount of resourceswhich can beused by any one VPN. For example, both control traffic and user data traffic may be rate limited. In some cases or in some parts of the network where a sufficiently large number of queues areavailableavailable, each VPN (and optionally each VPN and CoS within the VPN) may make use of a separate queue.Control-planeControl- plane resources such as link bandwidth as well as CPU and memory resources may be reserved on a per-VPN basis. The techniqueswhich areused toprovisionprovide resource protection between multiple users served by the same infrastructure can also be used to protect MPLS/GMPLS networks and services from Internet services. Ingeneralgeneral, the use of aggregated infrastructure allows the service provider to benefit from stochastic multiplexing of multiple bursty flows, and also may in some cases thwart traffic pattern analysis by combining the data from multiple users. 5.6. Service Provider Quality Control Processes Deployment of provider-provisioned VPN services in general requires a relatively large amount of configuration by theservice provider.SP. For example, theservice providerSP needs to configure which VPN each site belongs to, as well as QoS and SLA guarantees. This large amount of required configuration leads to the possibility of misconfiguration.Fang, et al. Informational 30 MPLS/GMPLS Security framework February 2007It is important for theservice providerSP to have operational processes in place to reduce the potential impact of misconfiguration.CE to CECE-to-CE authentication may also be used to detect misconfiguration when it occurs. 5.7. Deployment of Testable MPLS/GMPLS Service. This refers to solutions that can be readily tested to make sure they are configured correctly.E.g.For example, for a point-point connection, checking that the intended connectivity is working pretty much ensures that there is not connectivity to some unintended site. 6. Monitoring, Detection, and Reporting of Security Attacks MPLS/GMPLS network and service may be subject to attacks from a variety of security threats. Many threats are described in another part of this document. Many of the defensive techniques described in this document and elsewhere provide significant levels of protection from a variety of threats. However, in addition to silently employing defensive techniques to protect against attacks, MPLS/GMPLS services can also add value for both providers and Fang, et al. Informational 33 MPLS/GMPLS Security framework customers by implementing security monitoring systemswhichto detect and report on any security attacks which occur, regardless of whether the attacks are effective. Attackers often begin by probing and analyzing defenses, so systemswhichthat can detect and properly report these early stages of attacks can provide significant benefits. Information concerning attack incidents, especially if available quickly, can be useful in defending against further attacks. It can be used to help identify attackersand/oror their specific targets at an early stage. This knowledge about attackers and targets can be used tofurtherstrengthen defenses against specific attacks or attackers, or improve the defensive services for specific targets on anas-neededas- needed basis. Information collected on attacks may also be useful in identifying and developing defenses against novel attack types. Monitoring systems used to detect security attacks in MPLS/GMPLSwilltypically operate by collecting information from the Provider Edge (PE), Customer Edge (CE), and/or Provider backbone (P) devices. Security monitoring systems should have the ability to actively retrieve information from devices (e.g., SNMP get) or to passively receive reports from devices (e.g., SNMP notifications). The specific information exchangedwill dependdepends on the capabilities of the devices and on the type of VPN technology. Particular careFang, et al. Informational 31 MPLS/GMPLS Security framework February 2007should be given to securing the communications channel between the monitoring systems and the MPLS/GMPLS devices. Syslog WG is specifying "Logging Capabilities for IP Network Infrastructure". (The specific references will be made only if the draft(s) became RFC before this draft.) The CE, PE, and P devices should employ efficient methods to acquire and communicate the information needed by the security monitoring systems. It is important that the communication method between MPLS/GMPLS devices and security monitoring systems be designed so that it will not disrupt network operations. As an example, multiple attack events may be reported through a single message, rather than allowing each attack event to trigger a separate message, which might result in a flood of messages, essentially becoming a denial-of-service attack against the monitoring system or the network. The mechanisms for reporting security attacks should be flexible enough to meet the needs of MPLS/GMPLS service providers, MPLS/GMPLS customers, and regulatory agencies, if applicable. The specific reportswillshould depend on the capabilities of the devices, the security monitoring system, the type of VPN, and the service level agreements between the provider and customer. Fang, et al. Informational 34 MPLS/GMPLS Security framework 7. Service Provider General Security RequirementsIn this section, we discuss theThis section covers security requirementsthatthe provider may havein order to securefor securing its MPLS/GMPLS networkinfrastructure,infrastructure including LDP and RSVP-TE specific requirements. The MPLS/GMPLS serviceproviderprovider's requirements defined here arethe requirementsfor the MPLS/GMPLS core in the reference model. The core network can be implemented with different types of network technologies, and each core network may use different technologies to provide the various services to users with different levels of offered security. Therefore, a MPLS/GMPLS service provider may fulfill any number of the security requirements listed in this section. This document does not state that a MPLS/GMPLS network must fulfill all of these requirements to be secure. These requirements are focused on: 1) how to protect the MPLS/GMPLS core from various attacks outside the core including network users, both accidentally and maliciously, 2) how to protect the end users. 7.1. Protection within the Core Network 7.1.1. Control Plane Protection - General - Protocol authentication within the core:Fang, et al. Informational 32 MPLS/GMPLS Security framework February 2007The network infrastructure must support mechanisms for authentication of the control plane.InIf MPLS/GMPLS core is used, LDP sessions may be authenticated by use TCP MD5, in addition, IGP and BGP authentication should also be considered. For a core providing Layer 2 services,PE to PEPE-to-PE authentication may also beusedperformed via IPsec. See the above discussion of protocol security services: authentication, integrity (with replay detection), confidentiality. Protocols need to provide a complete set of security services from which the SP can choose. Also, the hard part is key management. With the cost of authentication coming down rapidly, the application of control plane authentication may not increase the cost of implementation for providers significantly, and will help to improve the security of the core. If the core is dedicated to MPLS/GMPLS enabled services and without any interconnects to third parties then this may reduce the requirement for authentication of the core control plane. -Elements protectionInfrastructure Hiding Fang, et al. Informational 35 MPLS/GMPLS Security framework Here we discuss means to hide the provider's infrastructure nodes. A MPLS/GMPLS provider may maketheits infrastructure routers (P and PE routers) unreachable from outside users and unauthorized internal users. For example, separate address space may be used for the infrastructure loopbacks. Normal TTL propagation may be altered to make the backbone look like one hop from the outside, but caution needs to be taken for loop prevention. This prevents the backbone addresses from being exposed through trace route; however this must also be assessed against operational requirements forend to endend-to-end fault tracing. An Internet backbone core may be re-engineered to make Internet routing an edge function, for example, by using MPLS label switching for all traffic within the core and possibly make the Internet a VPN within the PPVPN core itself. This helps to detach Internet access from PPVPN services. Separating control plane, data plane, and management plane functionality interms ofhardware and software may be implemented on the PE devices to improve security. This may help to limit the problems when attacked in one particular area, and may allow each plane to implement additional securitymeasurementmeasures separately. PEs are often more vulnerable to attack than P routers,sincebecause PEs cannot be made unreachabletofrom outside users by their very nature. Access to core trunk resources can be controlled on a per user basis bythe applicationusing of inboundrate-limiting/shaping,rate-limiting or traffic shaping; this canFang, et al. Informational 33 MPLS/GMPLS Security framework February 2007be further enhanced on a per Class of Service basis (seesectionSection 8.2.3) In the PE, using separate routing processes for different services, for example, Internet and PPVPNserviceservice, may help to improve the PPVPN security and better protect VPN customers. Furthermore, iftheresources, such as CPU and Memory,maycan be further separated based on applications, or even individual VPNs, it may help to provide improved security and reliability to individual VPN customers. 7.1.2. Control plane protection with RSVP-TE - RSVP Security Tools Isolation of the trusted domain is an important security mechanismwith respect tofor RSVP, to ensure that an untrusted element cannot access a router of the trusted domain.ThoughHowever, isolation is limited by the need to allow ASBR-ASBR communication for inter-AS LSPs. Isolation Fang, et al. Informational 36 MPLS/GMPLS Security framework mechanisms might also be bypassed by Router Alert IP packets.-A solutionwouldcould consistsinof disabling the RSVP router alert mode and dropping all IP packets with the router alert option, or also to dropon an interfaceall incoming IP packets on an interface with port 46, which requires an access-list at the IP port level) or spoofed IP packets if anti-spoofing is not otherwise activated. RSVP security can be strengthened by deactivating RSVP on interfaces with neighbors who are not authorized to use RSVP, to protect against adjacent CE-PE attacks. However, this does not really protect against DoSattacks, and does not protect againstattacks or attacks on non-adjacent routers. It has been demonstrated that substantial CPU resources are consumed simply by processing received RSVP packets, even if the RSVP process is deactivated for the specific interface on which the RSVPmessage ispackets are received. RSVP neighbor filtering at the protocol level, to restrict the set of neighbors that can send RSVP messages to a given router, protects against non-adjacent attacks. However, this does not protect against DoSattacks,attacks and does not effectively protect against spoofing of the source address of RSVP packets, if the filter relies on the neighbor's address within the RSVP message. RSVP neighbor filtering at the data plane level(access(with an access list to accept IPpacketpackets with port 46, only for specific neighbors). This requires Router Alert mode to bedeactivated. Thisdeactivated and does not protect against spoofing. - Authentication for RSVP messagesFang, et al. Informational 34 MPLS/GMPLS Security framework February 2007One of the most powerful tools for protection against RSVP-based attacks is the use of authentication for RSVP messages, based on a secure message hash using a key shared by RSVP neighbors. This protects against LSP creation attacks, at the expense of consuming significant CPU resources for digest computation. In addition, if the neighboring RSVP speaker is compromised, it could be used to launch attacks using authenticated RSVP messages. These methods, and certain other aspects of RSVP security, are explained in detail in RFC 4230 [RFC4230]. Key management must be implemented. Logging and auditing as well as multiple layers of crypto protection can help here. IPsec can also be used. Another valuable tool is RSVP message pacing, to limit the number of RSVP messages sent to a given neighbor during a given period. This allows blocking DoS attack propagation.In order to ensure continued effective operation of the MPLS router even in the case of an attack which is able to bypass packet filtering mechanisms such as Access Control Lists in the data plane, itThe trick with DoS isimportant that routers have some mechanisms to limit the impact of the attack. There should be a mechanism to rate limit the amount of control plane traffic addressedto let therouter, per interface. This should be configurable on a per-protocol basis, (and, ideally, on a per sender basis) to avoid an attacked protocol, or a given sender blocking all communications. This requires the ability to filter and limit the rate of incoming messages of particular protocols, such as RSVP (filtering at the IP port level), and particular senders). In addition, there should be a mechanism to limit CPUgood packet through andmemory capacity allocated to RSVP, so as to protect other control plane elements. In orderkeep operating. Rate limiting by itself needs tolimit the memory allocation, it will probablybenecessary to limit the number of LSPs which can be set up.selective do this. Fang, et al. Informational 37 MPLS/GMPLS Security framework - limit the impact of an attack on control plane resourcesIn order toTo ensure continued effective operation of the MPLS router even in the case of an attackwhich is able to bypassthat bypasses packet filtering mechanisms such as Access Control Lists in the data plane, it is important that routers have some mechanisms to limit the impact of the attack. There should be a mechanism to rate limit the amount of control plane traffic addressed to the router, per interface. This should be configurable on a per-protocol basis, (and, ideally, on aper senderper-sender basis) to avoid letting an attackedprotocol,protocol or a given sender blocking all communications. This requires the ability to filter and limit the rate of incoming messages of particular protocols, such as RSVP (filtering at the IPport level,protocol level), and particularsenders).senders. In addition, there should be a mechanism to limit CPU and memory capacity allocated to RSVP, so as to protect other control plane elements.In order toTo limit the memory allocation, it will probably be necessary to limit the number of LSPswhichthat can be set up.Fang, et al. Informational 35 MPLS/GMPLS Security framework February 20077.1.3. Control plane protection with LDP The approaches to protect MPLS routers against LDP-based attacks areverysimilar to those for RSVP, including isolation, protocol deactivation on specific interfaces, filtering of LDP neighbors at the protocol level, filtering of LDP neighbors at the data plane level (access list that filter the TCP & UDP LDP ports), authentication with message digest, rate limiting of LDP messages per protocol per sender and limiting all resourceswhich might beallocated to LDP-related tasks. 7.1.4. Data Plane Protection IPsectechnologiescan provide- encryption of secureauthentication, integrity, confidentiality, and replay detection for provider or user data. It also has an associated key management protocol. In today's MPLS/GMPLS, ATM, or Frame Relay networks, encryption is not provided as a basic feature. Mechanisms described in section 5 can be used to secure the MPLS data planeto secure the datatraffic carried over MPLS core. Both the Frame Relay Forum and the ATM Forum standardized cryptographic security services in the late 1990s, but these standards are not widely implemented. Fang, et al. Informational 38 MPLS/GMPLS Security framework 7.2. Protection on the User Access Link Peer/ Neighboror neighbor protocol authentication may be used to enhance security. For example, BGP MD5 authentication may be used to enhance security on PE-CE links using eBGP. In the case of Inter- provider connection,authentication / encryptioncryptographic protection mechanisms between ASes, such as IPsec, may be used. If multiple services are provided on the same PE platform, different WAN link layer addressspace separationspaces may be used for different services(e.g.(e.g., VPN and non-VPN)may be implementedtoimprove security in order to protect each service if multiple services are provided on the same PE platform.enhance isolation. Firewall/and Filtering: access control mechanisms can be used to filteroutany packets destined for the service provider's infrastructure prefix or eliminate routes identified asillegitimate routes.illegitimate. Rate limiting may be applied to the user interface/logical interfaces againstDDOSDDoS bandwidth attack. This isveryhelpful when the PE device is supporting both multi-services, especiallywhen supportingVPN and InternetServicesServices, on the same physical interfaces through different logical interfaces.Fang, et al. Informational 36 MPLS/GMPLS Security framework February 20077.2.1. Link Authentication Authenticationmechanismscan beemployedused to validate site access to the network via fixed or logical(e.g.connections, e.g. L2TP,IPsec) connections. WhereIPsec, respectively. If the user wishes to hold the'secret' associated to acceptance of theauthentication credentials for accessand site intoto the VPN, then provider solutions require the flexibility for either direct authentication by the PE itself or interaction with a customer authentication server. Mechanisms are required in the latter case to ensure that the interaction between the PE and the customer authentication server iscontrolled e.g. limiting it simply to an exchange in relation to the authentication phase and with other attributes e.g. RADIUS optionally being filtered.appropriately secured. 7.2.2. Access RoutingMechanismsRouting protocol level e.g., RIP, OSPF, or BGP, may be used to provide controlat a routing protocol level e.g. RIP, OSPF, BGPaccess betweenthea CE and PE. Per neighbor and per VPN routing policies may be established to enhance security and reduce the impact of a malicious or non-malicious attack on thePE, in particularPE; the followingmechanismsmechanisms, in particular, should be considered: - Limiting the number of prefixes that may be advertised on a per access basis into the PE. Appropriate action may be taken should a limit beexceeded e.g.exceeded, e.g., the PE shutting down the peer session to the CE - Applying route dampening at the PE on received routing updates Fang, et al. Informational 39 MPLS/GMPLS Security framework - Definition of a per VPN prefix limit after which additional prefixes will not be added to the VPN routing table. In the case of Inter-provider connection, access protection, link authentication, and routing policies as described above may be applied. Both inbound and outboundfirewall/filteringfirewall or filtering mechanism between ASes may be applied. Proper security procedures must be implemented in Inter-provider VPN interconnection to protect the providers' network infrastructure and theircustomercustomers' VPNs. This may be custom designed for each Inter-Provider VPN peering connection, and must be agreed upon by both providers. 7.2.3. Access QoS MPLS/GMPLS providers offeringQoS enabledQoS-enabled services require mechanisms to ensure that individual accesses are validated against their subscribed QOS profile and as such gain access to core resources that match their service profile. Mechanisms such as per Class ofserviceService ratelimiting/trafficlimiting or traffic shaping on ingress to the MPLS/GMPLS core are one optioninfor providing this level of control.Fang, et al. Informational 37 MPLS/GMPLS Security framework February 2007Such mechanisms may require the per Class of Service profile to be enforced either by marking, or remarking or discard of traffic outside of the profile. 7.2.4. Customer service monitoring tools End users requiringvisibility of thespecific statistics on thecore e.g.core, e.g., routing table, interface status, or QoS statistics,imposerequirements for mechanisms at the PEtoboth to validate the incoming user and limit the views available to that particular user. Mechanisms should also be considered to ensure that such access cannot be used a means of aDOSDoS attack (either malicious or accidental) on the PE itself. This could be accomplished through either separation of these resources within the PE itself or via the capability torate-limitrate- limit on a perphysical/logicalphysical or logical connection basis such traffic. 7.3. General Requirements for MPLS/GMPLS ProvidersTheMPLS/GMPLS providers must supporttheusers' security requirements as listed in Section 7. Depending on the technologies used, these requirements may include: - User control plane separation - routing isolation - Protection against intrusion,DOSDoS attacks and spoofing - Access Authentication Fang, et al. Informational 40 MPLS/GMPLS Security framework - Techniques highlighted through this document that identify methodologies for the protection of resources and the MPLS/GMPLS infrastructure.Equipment hardware/software bugsHardware or software errors in equipment leading to breaches in security are not within the scope of this document. 8. Inter-provider Security Requirements This section discusses security capabilities that are important at the MPLS/GMPLS Inter-providerconnections,connections and at devices (including ASBR routers)which support the Inter-providersupporting these connections. The security capabilities stated in this section should be considered as complementary to security considerations addressed intheindividual protocol specificationsand/oror security frameworks. Security vulnerabilities and exposures may be propagated across multiple networks because of security vulnerabilities arising in one peer's network. Threats to security originate from accidental,Fang, et al. Informational 38 MPLS/GMPLS Security framework February 2007 administrativeadministrative, and intentional sources. Intentional threats include events such as spoofing and Denial of Service (DoS) attacks. The level and nature of threats, as well as security and availability requirements, may vary over time and from network to network. This section therefore discusses capabilities that need to be available in equipment deployed for support of theMPLS-ICI.MPLS InterCarrier Interconnect (MPLS-ICI). Whether any particular capability is used in any one specific instance of the ICI is up to the service providers managing theprovider edgePE equipment offering/using the ICI services. 8.1. Control Plane Protection This section discusses capabilities for control plane protection, including protection of routing, signaling, and OAM capabilities. 8.1.1. Authentication of Signaling Sessions Authenticationofis needed for signaling sessions (i.e., BGP, LDP and RSVP-TE) and routing sessions (e.g., BGP) as well as OAM sessions across domain boundaries. Equipment must be able to support exchange of all protocol messages over a single IPsec tunnel, with NULL encryption and authentication, between the peering ASBRs. Support for TCP MD5 authentication for LDP and BGP and for RSVP-TE authentication must also be provided. Manual keying of IPsec should not be used. IKEv2 with pre-shared secrets or public key methods should be used. Replay detection should be used. Fang, et al. Informational 41 MPLS/GMPLS Security framework Mechanisms to authenticate and validate a dynamic setup request MUST be available. For instance, if dynamic signaling of a TE-LSP or PW is crossing a domain boundary, there must be a way to detect whether the LSP source is whoheit claims to be and that he is allowed to connect to the destination. MD5 authentication support for all TCP-based protocols within the scope of the MPLS-ICI (i.e., LDPsignaling,signaling and BGP routing) and MD5 authentication for the RSVP-TE Integrity Object MUST be provided to interoperate with current practices. Equipment SHOULD be able to support exchange of all signaling and routing (LDP, RSVP-TE, and BGP) protocol messages over a single IPSec security association pair in tunnel or transport mode with authentication but with NULL encryption, between the peering ASBRs. IPSec, if supported, must be supported withHMAC-MD-5HMAC-MD5 and optionally SHA-1. It is expected that authentication algorithms will evolve over time and support can be updated as needed. OAM Operations across the MPLS-ICI could also be the source of security threats on the provider infrastructure as well as the service offered over the MPLS-ICI. A large volume of OAM messages could overwhelm the processing capabilities of an ASBR if the ASBR is notprobablyproperly protected.Maliciously-generatedMaliciously generated OAM messages couldFang, et al. Informational 39 MPLS/GMPLS Security framework February 2007also be used to bring down an otherwise healthy service (e.g., MPLS Pseudo Wire), and thereforeeffectingaffect service security. MPLS-ping does not support authenticationtodaytoday, and that support should be subject for future considerations. Bidirectional Forwarding Detection(BFD)(BFD), however, does have support for carrying an authentication object. It also supports Time-To-Live (TTL) processing as an anti-replay measure. Implementations conformanttowith this MPLS-ICI should support BFD authentication usingMD-5MD5 and must support the procedures for TTL processing. 8.1.2. Protection against DoS attacks in the Control PlaneAbilityImplementation must have the ability to prevent signaling and routingDOSDoS attacks on the control plane per interface and provider. Such prevention may be provided by rate-limiting signaling and routing messages that can be sent by a peer provider according to a traffic profile and by guarding against malformed packets. Equipment MUST provide the ability to filter signaling, routing, and OAM packets destined for the device, and MUST provide the ability to rate limit such packets. Packet filters SHOULD be capable of being separately applied per interface, and SHOULD have minimal or no performance impact. For example, this allows an Fang, et al. Informational 42 MPLS/GMPLS Security framework operator to filter or rate-limit signaling, routing, and OAM messages that can be sent by a peer provider and limit such traffic to atrafficgiven profile.In the presence ofDuring a control plane DoS attack against an ASBR, the router SHOULD guarantee sufficient resources to allow network operators to execute network management commands to take corrective action, such as turning on additional filters or disconnecting an interfacewhich isunder attack. DoS attacks on the control plane SHOULD NOT adversely affect data plane performance. Equipmentwhich supportsrunning BGP MUST support the ability to limit the number of BGP routes received from any particular peer. Furthermore, in the case of IPVPN, a router MUST be able to limit the number of routes learned from a BGP peer per IPVPN. In the case that a device has multiple BGP peers, it SHOULD be possible for the limit to vary between peers. 8.1.3. Protection against Malformed Packets Equipment SHOULD be robust in the presence of malformed protocol packets. For example, malformed routing, signaling, and OAM packets should be treated in accordance to the relevant protocol specification.Fang, et al. Informational 40 MPLS/GMPLS Security framework February 20078.1.4. Ability to Enable/Disable Specific Protocols Ability to drop any signaling or routing protocol messages when these messages are to be processed by the ASBR but the corresponding protocol is not enabled on that interface. Equipment must allow an administrator to enable or disable a protocol (default protocol is disabled unless administratively enable) on an interface basis. Equipment MUST be able to drop any signaling or routing protocol messages when these messages are to be processed by the ASBR but the corresponding protocol is not enabled on that interface. This dropping SHOULD NOT adversely affect data plane or control plane performance. 8.1.5. Protection Against Incorrect Cross ConnectionCapabilityThe capability of detecting and locating faults inana LSPcross-connectcross- connect MUST be provided. Such faults may cause security violations as they result in directing traffic to the wrong destinations. This capability may rely on OAM functions. Fang, et al. Informational 43 MPLS/GMPLS Security framework Equipment MUST support MPLS LSP Ping [RFC4379]. This MAY be used to verify end to end connectivity for the LSP (e.g., PW, TE Tunnel, VPN LSP,etc),etc.), and to verifyPE to PEPE-to-PE connectivity for L3 VPN services. When routing information is advertised from one domain to the other,there MUST be mechanisms that enableoperators must be able to guard against situations that result in traffic hijacking, black-holing, resource stealing (e.g., number of routes), etc. For instance, in the IPVPN case, an operator must be able to block routes based on associated route target attributes. In addition, mechanisms must exist to verify whether a route advertised by a peer for a given VPN is actually a valid route and whether the VPN has a site attached or reachable through that domain. Equipment (ASBRs andRRs) which supportsRoute Reflectors (RRs)) supporting operation of BGP MUSTallow a meansbe able to restrict which Route Target attributes are sent to and accepted from a BGP peer across an ICI. Equipment (ASBRs, RRs) SHOULD also be able to inform the peer regarding which Route Target attributes it will accept fromthe peer. This is due to the fact thatapeer which sendspeer, because sending an incorrect Route Target can result in incorrect cross-connection of VPNs. Also, sending inappropriate route targets to a peer may disclose confidential information. Further Security Consideration for inter-provider BGP/MPLS IPVPN operations are discussed in the IPVPN Annex.Fang, et al. Informational 41 MPLS/GMPLS Security framework February 20078.1.6. Protection Against Spoofed Updates and Route Advertisements Equipment MUST supportsignaling and routing. Equipment MUST supportroute filtering of routes received via a BGP peer sessions by applying policies that include one or more the following: AS path, BGP next hop, standard communityand/oror extended community. 8.1.7. Protection of Confidential Information Ability to identify and prohibit messages that can reveal confidential information about network operation (e.g., performance OAMmessages,messages or MPLS-pingmessages).messages) is required. Service Providers must have the flexibility of handling these messages at the ASBR. Equipment SHOULD provide the ability to identify andprohibitrestrict where it sends messages or that can reveal confidential information about network operation (e.g., performance OAM messages, LSP Traceroute messages). Service Providers must have the flexibility of handling these messages at the ASBR. For example, equipment supporting LSP Traceroute MAY limit to which addresses replies can besent to.sent. Note: This capability should be used with care. For example, if a service provider chooses to prohibit the exchange of LSP PING Fang, et al. Informational 44 MPLS/GMPLS Security framework messages at the ICI, it may make it more difficult to debug incorrect cross-connection of LSPs or other problems. A provider may decide to progress these messages if they are incoming from a trusted provider and are targeted to specific agreed-on addresses. Another provider may decide to traffic police,rejectreject, or apply policies to these messages. Solutions must enable providers to control the information that is relayed to another provider about the path thatana LSP takes. For example, in RSVP-TE record route object or MPLS-ping trace, a provider must be able to control the information contained in corresponding messages when sent to another provider. 8.1.8. Protection Against over-provisioned number of RSVP-TE LSPs and bandwidth reservation In addition to the control plane protection mechanisms listed in the previous section on Control plane protection with RSVP-TE, the ASBRneeds mechanisms tomust be able both to limit the number of LSPs that can be set up by other domains and to limit the amount of bandwidth that can be reserved. A provider's ASBR may denythe LSPsa LSP set up request orthea bandwidth reservation request sent by another provider's whose the limitsarehave been reached.Fang, et al. Informational 42 MPLS/GMPLS Security framework February 20078.2. Data Plane Protection 8.2.1. Protection against DoS in the Data Plane This isprovideddescribed earlier in this document. 8.2.2. Protection against Label Spoofing Verification that a label received across an interconnect was actually assigned to the provider across the interconnect. If the label was not assigned to the provider, the packet MUST be dropped. Equipment MUST be able to verify that a label received across an interconnect was actually assigned toana LSP arriving from the provider across that interconnect. If the label was not assigned toana LSP which arrives at this router from the correct neighboring provider, the packet MUST be dropped. This verification can be applied to the top label only. The top label is the received top label and every label that is exposed by label popping to be used for forwarding decisions. Equipment MUST provide the capability of dropping MPLS-labeled packets if all labels in the stack are not processed. Thisprovideslets carriersthe capability of guaranteeingguarantee that every label that enters its domain from another carrier was actually assigned to that carrier. Fang, et al. Informational 45 MPLS/GMPLS Security framework The following requirements are not directly reflected in this document but must be used as guidance for addressing further work. Solutions MUST NOT force operators to reveal reachability information to routers within their domains. <note, it is believed that this requirement is met via other requirements specified in this section plus the normal operation of IP routing, which does not reveal individual hosts. Mechanisms to authenticate and validate a dynamic setup request MUST be available. For instance, if dynamic signaling of a TE-LSP or PW is crossing a domain boundary, there must be a way to detect whether the LSP source is whoheit claims to be and that he is allowed to connect to the destination. 8.2.3. Protection using ingress traffic policing and enforcementIn theThe followingdiagram, we use asimple diagramto illustrateillustrates a potential security issue on the data plane issue acrossthea MPLS interconnect: SP2 - ASBR2 - labeled path - ASBR1 - P1 - SP1's PSN - P2 - PE1Fang, et al. Informational 43 MPLS/GMPLS Security framework February 2007| | | | |< AS2 >|<MPLS interconnect>|< AS1 >| Traffic flow direction is from SP2 to SP1 Usually, the transit label used by ASBR2 is allocated byASBR1ASBR1, which in turn advertises it to ASB2 (downstream unsolicited or on-demand)demand), and this label is used for a service context (VPN label, PW VC label,etc.)etc.), and this LSP is normally terminated at a forwarding table belonging to the service instance on PE (PE1) in SP1. In the example above, ASBR1 would not knowifwhether the label of an incoming packet from ASBR2 over the interconnect is a VPN label or PSN label for AS1. So it is possible (though rare) that ASBR2 can be tempered such that the incoming label could match a PSN label (e.g., LDP) inAS1 - thenAS1. Then, this LSP would end up on the global plane of an infrastructure router (P orPE1) -PE1), and this could invite a unidirectional attack on that P or PE1 where the LSP terminates. To mitigate this threat,weimplementations SHOULD be able to do a forwarding path look-up for the label on an incoming packet fromaan interconnect in aLFIBLabel Forwarding Information Base (LFIB) space that is only intended for its own service context or provide a mechanism on the data plane that would ensure the incoming labels are what ASBR1 has allocated and advertised.SimilarFang, et al. Informational 46 MPLS/GMPLS Security framework A similar concept has been proposed in "Requirements for Multi- Segment Pseudowire Emulation Edge-to-Edge (PWE3)" [PW-REQ]. 9. Security Considerations Security considerations constitute the sole subject of this memo and hence are discussed throughout. Here we recap what has been presented and explain at averyhigh level the role of each type of consideration in an overall secure MPLS/GMPLS system. The document describes a number of potential security threats. Some of these threats have already been observed occurring in running networks; others are largely theoretical at this time.DOSDoS attacks and intrusionAttacksattacks from the Internet against serviceproviderproviders' infrastructure have beenseen to occur.seen. DOS "attacks" (typically not malicious) have also been seen in which CE equipment overwhelms PE equipment with high quantities or rates of packet traffic or routingFang, et al. Informational 44 MPLS/GMPLS Security framework February 2007information.Operational/provisioningOperational or provisioning errors are cited by service providers as one of their prime concerns. The document describes a variety of defensive techniques that may be used to counter the suspected threats. All of the techniques presented involve mature and widely implemented technologies that are practical to implement. The document describes the importance of detecting, monitoring, and reporting attacks, both successful and unsuccessful. These activities are essential for "understanding one's enemy", mobilizing new defenses, and obtaining metrics about how secure the MPLS/GMPLS network is. Assuchsuch, they are vital components of any complete PPVPN security system. The document evaluates MPLS/GMPLS security requirements from acustomercustomer's perspective as well as from a serviceproviderprovider's perspective. These sections re-evaluate the identified threats from the perspectives of the various stakeholders and are meant to assist equipment vendors and service providers, who must ultimately decide what threats to protect against in any givenequipmentconfiguration or service offering. 10. IANA Considerations TBD. Fang, et al. Informational 47 MPLS/GMPLS Security framework 11. Normative References [RFC3031] E. Rosen, A. Viswanathan, R. Callon, "Multiprotocol Label Switching Architecture", RFC 3031, January 2001. [RFC3945] E. Mannie, "Generalized Multi-Protocol Label Switching (GMPLS) Architecture", RFC 3945, October 2004. [RFC3036] Andersson, et al., "LDP Specification", January 2001. [RFC3209] Awduche, et al., "RSVP-TE: Extensions to RSVP for LSP Tunnels", December 2001. [RFC4301] S. Kent, K. Seo, "Security Architecture for the Internet Protocol," December 2005. [RFC4302] S. Kent, "IP Authentication Header," December 2005.Fang, et al. Informational 45 MPLS/GMPLS Security framework February 2007 [RFC4305] D. Eastlake 3rd,[RFC4835] V. Manral, "Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)",December 2005.April 2007. [RFC4306] C. Kaufman, "Internet Key Exchange (IKEv2) Protocol",December 2005. [RFC4309] Housley, R., "Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)", December 2005. [RFC4346] T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol, Version 1.1," April 2006. [RFC4379] K. Kompella and G. Swallow, "Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures", February 2006. [RFC4447] Martini, et al., "Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)", April 2006. [STD62] "Simple Network Management Protocol, Version3," RFCs 3411- 3418,3,", December 2002. [STD-8] J. Postel and J. Reynolds, "TELNET Protocol Specification", STD 8, May 1983. Fang, et al. Informational 48 MPLS/GMPLS Security framework 12. Informational References[AES-CCM] Housley, R., "Using AES CCM Mode With IPsec ESP", draft- ietf-ipsec-ciph-aes-ccm-05.txt, work in progress, November 2003.[RFC 2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997 [Beard] D. Beard and Y. Yang, "Known Threats to Routing Protocols,"draft-beard-rpsec-routing-threats-00.txt, Oct. 2002.draft-beard-rpsec-routing-threats-01.txt, Feb. 2003. (Note, this is now approved as RFC, no number yet, http://www.ietf.org/internet- drafts/draft-ietf-rpsec-routing-threats-06.txt. [OIF-SMI-01.0] Renee Esposito, "Security for Management Interfaces to Network Elements", Optical Internetworking Forum, Sept. 2003. [OIF-SMI-02.1] Renee Esposito, "Addendum to the Security for Management Interfaces to Network Elements", Optical Internetworking Forum, March 2006. [RFC2104] H. Krawczyk, M. Bellare, R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," February 1997. [RFC2411] R. Thayer, N. Doraswamy, R. Glenn, "IP Security Document Roadmap," November 1998. [RFC3174] D. Eastlake, 3rd, and P. Jones, "US Secure Hash Algorithm 1 (SHA1)," September 2001.Fang, et al. Informational 46 MPLS/GMPLS Security framework February 2007[RFC3562] M. Leech, "Key Management Considerations for the TCP MD5 Signature Option", July 2003. [RFC3631] S. Bellovin, C. Kaufman, J. Schiller, "Security Mechanisms for the Internet," December 2003. [RFC3985] S. Bryant and P. Pate, "Pseudo Wire Emulation Edge-to- Edge (PWE3) Architecture", March 2005.[RFC4111] L. Fang, "Security Framework of Provider Provisioned VPN", RFC 4111, July[RFC4103] G. Hellstrom and P. Jones, "RTP Payload for Text Conversation", June 2005.[RFC3631][RFC4107] S. Bellovin,C. Kaufman, J. Schiller, "Security MechanismsR. Housley, "Guidelines forthe Internet," December 2003.Cryptographic Key Management", June 2005. [RFC4110] R. Callon and M. Suzuki, "A Framework for Layer 3 Provider-Provisioned Virtual Private Networks(PPVPNs),(PPVPNs)", July 2005. Fang, et al. Informational 49 MPLS/GMPLS Security framework [RFC4111] L. Fang, "Security Framework of Provider Provisioned VPN", RFC 4111, July 2005. [RFC4230] H. Tschofenig and R. Graveman, "RSVP Security Properties", December 2005. [RFC4308] P. Hoffman, "Cryptographic Suites for IPsec", December 2005. [RFC4808] S. Bellovin, "Key Change Strategies for TCP-MD5", March 2007. [RFC4869] L. Law and J. Solinas, "Suite B Cryptographic Suites for IPsec", April 2007. [MFA MPLS ICI] N. Bitar, "MPLS InterCarrier Interconnect Technical Specification", MFA2006.109.01, August 2006. [opsec efforts] C. Lonvick and D. Spak, "Security Best Practices Efforts and Documents", draft-ietf-opsec-efforts-05.txt, December 2006. [PW-REQ] N. Bitar, M. Bocci, L. Martini, "Requirements for Multi- Segment Pseudowire Emulation Edge-to-Edge", draft-ietf-pwe3-ms-pw-requirements-04.txt.requirements-05.txt, March 2007. 13. Author's Addresses Luyuan Fang Cisco Systems, Inc. 300 Beaver Brook Road Boxborough, MA 01719 USAEMail:Email: lufang@cisco.com Michael Behringer Cisco Systems, Inc. Village d'Entreprises Green Side 400, Avenue Roumanille, Batiment T 3 06410 Biot, Sophia Antipolis FRANCE Fang, et al. Informational 50 MPLS/GMPLS Security framework Email: mbehring@cisco.com Ross Callon Juniper Networks 10 Technology Park Drive Westford, MA 01886Fang, et al. Informational 47 MPLS/GMPLS Security framework February 2007USA Email: rcallon@juniper.net Jean-Louis Le Roux France Telecom 2, avenue Pierre-Marzin 22307 Lannion Cedex FRANCE Email: jeanlouis.leroux@francetelecom.com Raymond Zhang British Telecom 2160 E. Grand Ave. El Segundo, CA 90025 USA Email: raymond.zhang@bt.com Paul Knight Nortel 600 Technology Park Drive Billerica, MA 01821EMail:Email: paul.knight@nortel.com Yaakov (Jonathan) Stein RAD Data Communications 24 Raoul Wallenberg St., Bldg C Tel Aviv 69719 ISRAEL Email: yaakov_s@rad.com Nabil Bitar Verizon 40 Sylvan Road Waltham, MA 02145 Email: nabil.bitar@verizon.com Fang, et al. Informational 51 MPLS/GMPLS Security framework Richard Graveman RFG Security 15 Park Avenue Morristown, NJ 07960 Email: rfg@acm.org Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.Fang, et al. Informational 48 MPLS/GMPLS Security framework February 2007Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- ipr@ietf.org. Full Copyright Statement Copyright (C) The IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.DisclaimerFang, et al. Informational 52 MPLS/GMPLS Security framework This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- ipr@ietf.org. 14.AcknowledgementAcknowledgements Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA). The author and contributors would also like to acknowledge the helpful comments and suggestions from Sam Hartman and Adrian Farrel. Fang, et al. Informational4953