Hi Acee,
RFC 6506 inherited this property from RFC 5709 which has this text word for word:

                        In the event that the last key associated
    with an interface expires, it is unacceptable to revert to an
    unauthenticated condition, and not advisable to disrupt routing.
    Therefore, the router should send a "last Authentication Key
    expiration" notification to the network manager and treat the key as
    having an infinite lifetime until the lifetime is extended, the key
    is deleted by network management, or a new key is configured.

To me this property looks wrong from security point of view and in general I would agree to have it removed. OTOH difference between v2 and v3 specs is highly undesirable, so if RFC 6506 is changed so that this property is dropped (or made optional) then at the same time we should evaluate how the same change can be pushed into RFC 5709.

Anton






On 10/08/2013 12:35 AM, Acee Lindem wrote:
Hi Mike,
I agree and don't see why this one configuration error should be handled 
explicitly when there are many other possible errors. Actually, I'd looked at 
this text before and meant to address it since I'd never implement this. I'll 
discuss with the other authors.
Thanks,
Acee

On Oct 7, 2013, at 6:19 PM, Mike Dubrovskiy (mdubrovs) wrote:

Hi Acee,

I like the change but we currently have the following text in rfc6506

   "In the event that the last key associated
   with an interface expires, it is unacceptable to revert to an
   unauthenticated condition and not advisable to disrupt routing.
   Therefore, the router SHOULD send a "last Authentication Key
   expiration" notification to the network operator and treat the key as
   having an infinite lifetime until the lifetime is extended, the key
   is deleted by the network operator, or a new key is configured."

The above text is difficult to apply to Accept keys. It should be either deleted
or modified.

Thank you,
Mike

-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of
Acee Lindem
Sent: Monday, October 07, 2013 1:25 PM
To: OSPF List
Subject: [OSPF] One more RFC 6506BIS Clarification

One more thing I intend to add is explicit specification that the OSPFv3 packet
should be dropped if the Security Association isn't found or has expired. The
text is analogous to the original RFC 2328 Appendix D text. This will be added
to section 4.6.

***************
*** 976,981 ****
--- 976,986 ----
     and the IPv6 header length is less than the amount necessary to
     include an Authentication Trailer.

+    Locate the receiving interface's OSPFv3 SA using the SA ID in the
+    received AT.  If the SA is not found, or if the SA is not valid for
+    reception (i.e., current time < KeyStartAccept or current time >=
+    KeyStopAccept), the OSPFv3 packet is dropped.
+
     If the cryptographic sequence number in the AT is less than or equal
     to the last sequence number in the last OSPFv3 packet of the same
     OSPFv3 type successfully received from the neighbor, the OSPFv3

Although I would hope no one would complain about this since it was always
implied in section 3 (see excerpt below), please speak now if you have any
concerns.

   o  Security Association Identifier (SA ID)

      This is a 16-bit unsigned integer used to uniquely identify an
      OSPFv3 SA, as manually configured by the network operator.

      The receiver determines the active SA by looking at the SA ID
      field in the incoming protocol packet.




_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf
_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf

_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to