< draft-nslag-mpls-deprecate-md5-00.txt   draft-nslag-mpls-deprecate-md5-01.txt >
MPLS Working Group L. Andersson MPLS Working Group L. Andersson
Internet-Draft Bronze Dragon Consulting Internet-Draft Bronze Dragon Consulting
Updates: 5036 (if approved) S. Bryant Intended status: Informational S. Bryant
Intended status: Best Current Practice A. Malis Expires: September 2, 2018 A. Malis
Expires: August 26, 2018 Huawei Technologies Huawei Technologies
N. Leymann N. Leymann
Deutshe Telekom Deutshe Telekom
G. Swallow G. Swallow
Independent Independent
February 22, 2018 March 1, 2018
Deprecating MD5 for LDP Deprecating MD5 for LDP
draft-nslag-mpls-deprecate-md5-00.txt draft-nslag-mpls-deprecate-md5-01.txt
Abstract Abstract
When the MPLS Label Distribution Protocol (LDP) was specified circa When the MPLS Label Distribution Protocol (LDP) was specified circa
1999, there were very strong requirements that LDP should use a 1999, there were very strong requirements that LDP should use a
cryptographic hash function to sign LDP protocol messages. MD5 was cryptographic hash function to sign LDP protocol messages. MD5 was
widely used at that time, and was the obvious choices. widely used at that time, and was the obvious choices.
However, even when this decision was being taken there were concerns However, even when this decision was being taken there were concerns
as to whether MD5 was a strong enough signing option. This as to whether MD5 was a strong enough signing option. This
skipping to change at page 2, line 10 skipping to change at page 2, line 10
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 26, 2018. This Internet-Draft will expire on September 2, 2018.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 34 skipping to change at page 2, line 34
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Requirement Language . . . . . . . . . . . . . . . . . . 3 1.1. Requirement Language . . . . . . . . . . . . . . . . . . 3
2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. LDP in RFC 5036 . . . . . . . . . . . . . . . . . . . . . 3 2.1. LDP in RFC 5036 . . . . . . . . . . . . . . . . . . . . . 3
2.2. MD5 in BGP . . . . . . . . . . . . . . . . . . . . . . . 3 2.2. MD5 in BGP . . . . . . . . . . . . . . . . . . . . . . . 3
2.3. Prior Art . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Securing LDP . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Securing LDP . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5
7.1. Normative References . . . . . . . . . . . . . . . . . . 5 7.1. Normative References . . . . . . . . . . . . . . . . . . 5
7.2. Informative References . . . . . . . . . . . . . . . . . 5 7.2. Informative References . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6
1. Introduction 1. Introduction
RFC 3036 was published in January 2001 as a Proposed Standard, and it RFC 3036 was published in January 2001 as a Proposed Standard, and it
was replaced by RFC 5035, which is a Draft Standard, in October 2007. was replaced by RFC 5035, which is a Draft Standard, in October 2007.
Two decades after LDP was originally specified there is a concern Two decades after LDP was originally specified there is a concern
shared by the security community and the IETF working groups that shared by the security community and the IETF working groups that
develop the LDP protocol that LDP is no longer adequately secured. develop the LDP protocol that LDP is no longer adequately secured.
skipping to change at page 4, line 7 skipping to change at page 4, line 7
for LDP also. for LDP also.
As far as we are able to ascertain, there is currently no As far as we are able to ascertain, there is currently no
recommended, mandatory to implement, cryptographic function recommended, mandatory to implement, cryptographic function
specified. We are concerned that without such a mandatory function, specified. We are concerned that without such a mandatory function,
implementations will simply fall back to MD5 and nothing will really implementations will simply fall back to MD5 and nothing will really
be changed. The MPLS working group will need the expertise of the be changed. The MPLS working group will need the expertise of the
security community to specify a viable security function that is security community to specify a viable security function that is
suitable for wide scale deployment on existing network platforms. suitable for wide scale deployment on existing network platforms.
2.3. Prior Art
RFC 6952 [RFC6952] dicusses a set of routing protocols that all are
using TCP for transport of protocol messages, according to guidelines
set forth in Section 4.2 of "Keying and Authentication for Routing
Protocols Design Guidelines", RFC 6518 [RFC6518].
RFC 6952 takes a much broader approach than this document, it
discusses several protcols and also securing the LDP session
initialization. This document has a narrower scope, securing LDP
session messages only. LDP in initialization mode is addressed in
RFC 7349 [RFC7349].
RFC 6952 and this document, basically suggest the same thing, move to
TCP-AO and deploy a strong cryotoigraphic algorithm.
All the protcols discuseed in RFC 6952 should adopt the approach to
securing protocol messages over TCP.
3. Securing LDP 3. Securing LDP
Implementations conforming to this RFC MUST implement TCP-AO to Implementations conforming to this RFC MUST implement TCP-AO to
secure the TCP sessions carrying LDP in addition to the currently secure the TCP sessions carrying LDP in addition to the currently
required TCP MD5 Signature Option. required TCP MD5 Signature Option.
A TBD cryptographic mechanism must be implemented and provided to A TBD cryptographic mechanism must be implemented and provided to
TCP-AO to secure LDP messages. TCP-AO to secure LDP messages.
The TBD mechanism is the preferred option, and MD5 SHOULD only to be The TBD mechanism is the preferred option, and MD5 SHOULD only to be
skipping to change at page 6, line 5 skipping to change at page 6, line 24
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
7.2. Informative References 7.2. Informative References
[RFC3036] Andersson, L., Doolan, P., Feldman, N., Fredette, A., and [RFC3036] Andersson, L., Doolan, P., Feldman, N., Fredette, A., and
B. Thomas, "LDP Specification", RFC 3036, B. Thomas, "LDP Specification", RFC 3036,
DOI 10.17487/RFC3036, January 2001, DOI 10.17487/RFC3036, January 2001,
<https://www.rfc-editor.org/info/rfc3036>. <https://www.rfc-editor.org/info/rfc3036>.
[RFC6518] Lebovitz, G. and M. Bhatia, "Keying and Authentication for
Routing Protocols (KARP) Design Guidelines", RFC 6518,
DOI 10.17487/RFC6518, February 2012,
<https://www.rfc-editor.org/info/rfc6518>.
[RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of
BGP, LDP, PCEP, and MSDP Issues According to the Keying
and Authentication for Routing Protocols (KARP) Design
Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013,
<https://www.rfc-editor.org/info/rfc6952>.
[RFC7349] Zheng, L., Chen, M., and M. Bhatia, "LDP Hello
Cryptographic Authentication", RFC 7349,
DOI 10.17487/RFC7349, August 2014,
<https://www.rfc-editor.org/info/rfc7349>.
[RFC7454] Durand, J., Pepelnjak, I., and G. Doering, "BGP Operations [RFC7454] Durand, J., Pepelnjak, I., and G. Doering, "BGP Operations
and Security", BCP 194, RFC 7454, DOI 10.17487/RFC7454, and Security", BCP 194, RFC 7454, DOI 10.17487/RFC7454,
February 2015, <https://www.rfc-editor.org/info/rfc7454>. February 2015, <https://www.rfc-editor.org/info/rfc7454>.
Authors' Addresses Authors' Addresses
Loa Andersson Loa Andersson
Bronze Dragon Consulting Bronze Dragon Consulting
Email: loa@pi.nu Email: loa@pi.nu
 End of changes. 9 change blocks. 
8 lines changed or deleted 44 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/