Hi Abhinay,
OSPFv3 authentication trailer RFC (RFC7166) is newer RFC than OSPFv2 HMAC
authentication (RFC5709), and
in RFC 7166, in section 1.2. Summary of Changes from RFC 6506 ,
2. Section 3 previously recommended usage of an expired key for
transmitted OSPFv3 packets when no valid keys existed. This
statement has been removed.
So, as per this RFC, my understanding is , it is not recommended to use expired
key for authentication.
We are planning to support HMAC for both OSPFv2/v3, we thought if we keep
consistent behavior for both will be helpful.
Thanks & Regards,
Veerendranath
-----Original Message-----
From: Lsr <[email protected]> On Behalf Of Abhinay R
Sent: Monday, March 8, 2021 2:14 PM
To: Veerendranatha Reddy V
<[email protected]>
Cc: [email protected]
Subject: Re: [Lsr] [OSPFv2/v3] Regarding Authentication process during last key
expiry or no active keys of key chain
Hi Veeru,
Is there a need to have the same behaviour? When we had to implement it
I remember we followed rule 1 for OSPFv3, but we triggered a trap message
before doing so.
Thanks & Regards,
Abhinay R
On Mon, Mar 8, 2021 at 9:00 AM Veerendranatha Reddy V
<[email protected]> wrote:
>
> Hi All,
>
> As per OSPF authentication RFCs , during last key expired/inactive key
> of key chain the behavior of authentication process is different
> between OSPFv2/v3
>
>
>
> For OSPFv2 from RFC 5709,
>
> [ From Section 3.2]
>
> Key storage SHOULD persist across a system restart, warm or cold,
> to
>
> avoid operational issues. In the event that the last key
> associated
>
> with an interface expires, it is unacceptable to revert to an
>
> unauthenticated condition, and not advisable to disrupt routing.
>
> Therefore, the router should send a "last Authentication Key
>
> expiration" notification to the network manager and treat the key
> as
>
> having an infinite lifetime until the lifetime is extended, the key
>
> is deleted by network management, or a new key is configured.
>
>
>
> For OSPFv3 from RFC7166,
>
> [From Section 3]
>
> Key storage SHOULD persist across a system restart, warm or
> cold,
>
> to avoid operational issues. In the event that the last key
>
> associated with an interface expires, the network operator
> SHOULD
>
> be notified, and the OSPFv3 packet MUST NOT be transmitted
>
> unauthenticated.
>
>
>
> For new implementation for these RFCs, I am requesting to provide the
> suggested behavior.
>
> Sending side:
>
> Should not send the packet until valid key configured on key chain.
> Packet send without authentication.
> Packet send with the last expired authentication key.
>
>
>
> Receiving side:
>
> Ignore the packets until valid key configured on key chain.
> Accept the packets without authentication.
> Accept the packets matches the last expired key.
>
>
>
>
>
> Thanks & Regards,
>
> Veerendranath
>
> _______________________________________________
> Lsr mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/lsr
--
~♥~♫AbHiNaY♫~♥~∞
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr