Hi All,
As per OSPF authentication RFCs , during last key expired/inactive key of key
chain the behavior of authentication process is different between OSPFv2/v3
For OSPFv2 from RFC 5709,
[ From Section 3.2]
Key storage SHOULD persist across a system restart, warm or cold, to
avoid operational issues. In the event that the last key associated
with an interface expires, it is unacceptable to revert to an
unauthenticated condition, and not advisable to disrupt routing.
Therefore, the router should send a "last Authentication Key
expiration" notification to the network manager and treat the key as
having an infinite lifetime until the lifetime is extended, the key
is deleted by network management, or a new key is configured.
For OSPFv3 from RFC7166,
[From Section 3]
Key storage SHOULD persist across a system restart, warm or cold,
to avoid operational issues. In the event that the last key
associated with an interface expires, the network operator SHOULD
be notified, and the OSPFv3 packet MUST NOT be transmitted
unauthenticated.
For new implementation for these RFCs, I am requesting to provide the suggested
behavior.
Sending side:
1. Should not send the packet until valid key configured on key chain.
2. Packet send without authentication.
3. Packet send with the last expired authentication key.
Receiving side:
1. Ignore the packets until valid key configured on key chain.
2. Accept the packets without authentication.
3. Accept the packets matches the last expired key.
Thanks & Regards,
Veerendranath
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr