On Sep 29, 2008, at 1:02 PM, Sandy Murphy wrote:
What (if any) current initiatives are there that would support
automated
key exchange for OSFPv3 authentication?
You have msec on the list of recipients, which is where I (not an
active
participant, mind you) think the answer lies.
I agree with Sandy.
Both GDOI (RFC 3547) and
GSAKMP (RFC 4535) are group key management protocols, which is what
OSPFv3 needs. Unfortunately, both assume the existence of a group
controller that plays an important role in distributing keys. In
other
words, the very democratic all-are-equal many-to-many model of OSPF
might find it
difficult to map to the envisioned group security architecture. I
suppose it might be possible to consider the Designated Router as the
group controller, but as the DR is elected, that might be a
difficult fit.
There is an expired individual I-D that explores several options
along these lines: <http://tools.ietf.org/html/draft-liu-ospfv3-
automated-keying-req-01>. However, there isn't (in my opinion) an
obvious way forward. We can allocate some time on the Minneapolis
MSEC WG agenda on this topic if there's sufficient interest.
Brian
Even if you solve the group key management problem for OSPFv3, you
still
have the difficulty to doing anti-replay in a multicast environment.
Manral presented a draft some years ago to the rpsec working group
about
the crypto vulnerabilities of routing protocols, and concentrated for
OSPFv3 on replay vulnerabilities. Unfortunately, that did not go
anywhere.
Just for fun, I'm adding the routing area ADs and the secdir on
this list.
This is one of those cross-disciplinary concerns that has the right
people
in several different wgs and areas. The more the merrier, right?
The one quibble I have is that the tsvwg probably has little to do
with this
problem - the transport for OSPFv3 is IP, not TCP, and IP is not
the level
of stuff their charter looks at.
(And sorry for the late reply to your messages, I've been mulling
the options.)
--Sandy
--------- In reply to ------------------------
Date: Tue, 23 Sep 2008 17:52:07 -0400
From: Ed Jankiewicz <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED], [email protected], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: [RPSEC] Authentication for OSPFv3
I am not an active follower of these lists but have a question.
Please
reply off-list directly to [EMAIL PROTECTED] or copy me if this
triggers relevant discussion on your list.
What (if any) current initiatives are there that would support
automated
key exchange for OSFPv3 authentication? RFC 4552 relies upon pre-
shared
secret keys for generating message digest, but some of my constituents
have issues with manual generation, distribution and configuration of
keys in their IPv6 network deployment. Is any of the current work on
IKE revisions applicable, any work being done in your working
group, or
do you know of any OSPF-specific solution being developed somewhere?
Thanks.
--
Ed Jankiewicz - SRI International
Fort Monmouth Branch Office - IPv6 Research
Supporting DISA Standards Engineering Branch
732-389-1003 or [EMAIL PROTECTED]
_______________________________________________
RPSEC mailing list
[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/rpsec
--
Brian Weis
Router/Switch Security Group, ARTG, Cisco Systems
Telephone: +1 408 526 4796
Email: [EMAIL PROTECTED]
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr