Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
Network Working Group Manav Bhatia
Internet Draft Alcatel-Lucent
Expires: September 2007 Vishwas Manral
IP Infusion
Cryptographic Algorithm Implementation Requirements for IS-IS
draft-bhatia-manral-crypto-req-isis-01.txt
Status of this Memo
Distribution of this memo is unlimited.
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
IS-IS currently defines two different kinds of authentication
schemes: Clear Text password and HMAC-MD5. There has been recently a
new draft submitted that adds support for a generic cryptographic
authentication scheme, which can make use of different cryptographic
algorithms in order to authenticate the IS-IS PDUs.
To ensure interoperability between disparate implementations, it is
imperative that we specify a set of mandatory-to-implement algorithms
to ensure that there is at least one algorithm that all
implementations will have available.
This document defines the current set of mandatory-to-implement
algorithms to be used for the cryptographic authentication for IS-IS
Bhatia and Manral [Page 1]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
as well as specifying the algorithms that should be implemented
because they may be promoted to mandatory at some future time.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [KEYWORDS]
1. Introduction
IS-IS [ISO] [RFC1195] specification allows for authentication of its
PDUs via the authentication TLV 10 that is carried as the part of the
PDU. The base spec has provision for only clear text passwords and
RFC 3567 [RFC3567] augments this to provide the capability to use
HMAC-MD5 authentication for its PDUs.
In the clear text password scheme of authentication, the passwords
are exchanged in the clear text on the network and anyone with
physical access to the network can learn the password and compromise
the security of the IS-IS domain.
The HMAC-MD5 scheme is also not good enough as there have recently
been reports about attacks on the collision resistance properties of
MD5 [MD5-attack]. MD5CRK, was a distributed computing project to
break the MD5 hash algorithm in a short period of time. The project
closed down with the publication of the paper [MD5-attack].
It was discovered that collisions can be found in MD5 algorithm in
less than 24 hours, making MD5 very insecure. Further research has
verified this result and shown other ways to find collisions in MD5
hashes. We thus need to move away from MD5 towards more complex and
difficult to break hash algorithms.
The [ISIS-HMAC] document recently submitted in the IETF addresses
this. It is imperative that we move away from using MD5 to something
thatÂ’s cryptographically more stronger (like HMAC-SHA-1).
However, the nature of cryptography is that new algorithms surface
continuously and existing algorithms are continuously attacked. An
algorithm believed to be strong today may be demonstrated to be weak
tomorrow. Given this, the choice of mandatory-to-implement algorithm
should be conservative so as to minimize the likelihood of it being
compromised quickly.
Also, we need to recognize that the mandatory-to-implement
algorithm(s) may need to change over time to adapt to the changing
world. For this reason, the selection of mandatory-to-implement
algorithms should not be included in the base IS-IS specification.
Bhatia and Manral [Page 2]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
This way it is only this document that needs to get updated, whenever
there is a need to update the status of mandatory-to-implement
authentication algorithms.
2. Requirements Terminology
Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and
"MAY" that appear in this document are to be interpreted as described
in [RFC2119].
We define some additional terms here:
SHOULD+ This term means the same as SHOULD. However, it is
likely that an algorithm marked as SHOULD+ will be
promoted at some future time to be a MUST.
SHOULD- This term means the same as SHOULD. However, it is
likely that an algorithm marked as SHOULD- will be
deprecated to a MAY or worse in a future version of
this document.
MUST- This term means the same as MUST. However, we expect
that at some point in the future this algorithm will no
longer be a MUST.
3. Authentication Scheme Selection
For IS-IS implementations to interoperate, they must support one or
more authentication schemes in common. This section specifies the
requirements for standards conformant IS-IS implementations, which
desire to utilize the security feature.
Old Old New
Req. RFC Requirement Authentication Scheme
--- ------ ----------- ------------------------
MUST ISO-10589/ SHOULD NOT Clear Text Password (1)
RFC 1195
MUST 3567 MUST- HMAC-MD5
- - SHOULD+ Cryptographic Auth [ISIS-HMAC]
The above is only true in case security is required, if there is no
requirement of security from an implementation, the above
requirements need not be followed
Notes:
(1)This is used when all the routers can "trust" one another but the
operator does not want an accidental introduction of a router in
the domain. This scheme of authentication is useful, but not when
the operator wants to "cryptographically" authenticate the OSPF
packets.
Bhatia and Manral [Page 3]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
4. Authentication Algorithm Selection
For IS-IS implementations to interoperate, they must support one or
more authentication algorithms in common that can be used in the
cryptographic scheme of authentication.
This section details the authentication algorithm requirements for
standards conformant IS-IS implementations.
Old Old New
Req. RFC Requirement Authentication Algorithm
--- ------ ----------- ------------------------
MUST 3567 MUST- HMAC-MD5
- - SHOULD+ HMAC-SHA-1 [ISIS-HMAC]
- - MAY+ HMAC-SHA-256/HMAC-SHA-384/HMAC-SHA-512
5. Security Considerations
The cryptographic mechanisms defined in this document define only
authentication algorithms, and do not provide any confidentiality.
However encrypting the content of the packet (providing
confidentiality) is not of as great a value to routing protocols as
authenticating the source of the packet.
It should be noted that the cryptographic strength of the HMAC
depends upon the cryptographic strength of the underlying hash
function and on the size and quality of the key.
To ensure greater security, the keys used must be changed
periodically and implementations MUST be able to store and use more
than one key at the same time.
This document concerns itself with the selection of cryptographic
algorithms for the use of IS-IS, specifically with the selection of
"mandatory-to-implement" algorithms. The algorithms identified in
this document as "MUST implement" or "SHOULD implement" are not known
to be broken at the current time, and cryptographic research so far
leads us to believe that they will likely remain secure into the
foreseeable future. However, this isn't necessarily forever. We
would therefore expect that new revisions of this document will be
issued from time to time that reflect the current best practice in
this area.
6. Acknowledgements
Bhatia and Manral [Page 4]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
Much of the wording herein was adapted from RFC 4307, "Cryptographic
Algorithms for Use in the Internet Key Exchange Version 2", by
Jeffrey I. Schiller.
7. IANA Considerations
This document places no requests to IANA.
8. References
8.1 Normative References
[KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119
[ISO] "Intermediate system to Intermediate system routeing
information exchange protocol for use in conjunction with
the Protocol for providing the Connectionless-mode
Network Service (ISO 8473)", ISO/IEC 10589:1992
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, December 1990.
[RFC3567] Li, T. and R. Atkinson, "Intermediate System to
Intermediate System (IS-IS) Cryptographic
Authentication", RFC 3567, July 2003
[ISIS-HMAC] Bhatia, M., Manral, V. and White, R.,"ISIS HMAC
Cryptographic Authentication", Work in Progress
8.2 Informative References
[MD5-attack] Wang, X. et al., "Collisions for Hash Functions MD4,
MD5, HAVAL-128 and RIPEMD", August 2004,
http://eprint.iacr.org/2004/199
9. Author's Addresses
Manav Bhatia
Alcatel-Lucent
Bangalore, India
Email: manav@alcatel-lucent.com
Vishwas Manral
IP Infusion
Almora, Uttarakhand
India
Email: vishwas@ipinfusion.com
Bhatia and Manral [Page 5]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Bhatia and Manral [Page 6]
Internet Draft draft-bhatia-manral-crypto-req-isis-01.txt March 2007
Bhatia and Manral [Page 7]