Skip to main content

Summary of Cryptographic Authentication Algorithm Implementation Requirements for Routing Protocols
draft-ietf-opsec-igp-crypto-requirements-04

Revision differences

Document history

Date Rev. By Action
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Robert Sparks
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2010-11-09
04 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-11-01
04 (System) IANA Action state changed to No IC from In Progress
2010-11-01
04 (System) IANA Action state changed to In Progress
2010-11-01
04 Cindy Morgan IESG state changed to Approved-announcement sent
2010-11-01
04 Cindy Morgan IESG has approved the document
2010-11-01
04 Cindy Morgan Closed "Approve" ballot
2010-10-28
04 Ron Bonica State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ron Bonica
2010-10-28
04 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-10-12
04 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner
2010-10-11
04 (System) New version available: draft-ietf-opsec-igp-crypto-requirements-04.txt
2010-10-09
03 (System) New version available: draft-ietf-opsec-igp-crypto-requirements-03.txt
2010-10-08
04 Robert Sparks [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss by Robert Sparks
2010-10-01
02 (System) New version available: draft-ietf-opsec-igp-crypto-requirements-02.txt
2010-09-29
04 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to Yes from Discuss by Adrian Farrel
2010-09-29
04 Adrian Farrel
[Ballot comment]
Moved one small point from my previous Discuss. WOuld be nice to get it fixed.

You have caught most cases of ...

  …
[Ballot comment]
Moved one small point from my previous Discuss. WOuld be nice to get it fixed.

You have caught most cases of ...

  In order for ... implementations to interoperate, they must support
  one or more authentication schemes in common.

... with good change to include "with the use of security"

However, I still see issues in sections 2.2 (first line), 3.2 (first line), 5.2 (first line)
2010-09-29
04 Adrian Farrel [Ballot discuss]
2010-09-27
04 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-09-27
01 (System) New version available: draft-ietf-opsec-igp-crypto-requirements-01.txt
2010-09-24
04 (System) Removed from agenda for telechat - 2010-09-23
2010-09-23
04 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from Waiting for AD Go-Ahead by Cindy Morgan
2010-09-23
04 Tim Polk
[Ballot discuss]
[updated to remove one issue]

In section 4.2, Authentication Algorithm Selection (in the OSPFv2 section) states:

    Implementations must provide support for …
[Ballot discuss]
[updated to remove one issue]

In section 4.2, Authentication Algorithm Selection (in the OSPFv2 section) states:

    Implementations must provide support for
  HMAC-SHA-256 as this will become the algorithm of choice.

I think this should really be HMAC-SHA-1.  This would be consistent with the guidance for all other protocols.
However, the remainder of 4.2 is consistent with the cited text.  Is there a good reason that OSPFv2 would
jump directly to HMAC-SHA-256 when all the other protocols are migrating to HMAC-SHA-1?
2010-09-23
04 Tim Polk [Ballot comment]
I support Sean's discuss issue #4
2010-09-23
04 Tim Polk
[Ballot discuss]
Discuss-Discuss:

I could not sort out the real goals of this document.  I am unsure whether we are setting the stage for a …
[Ballot discuss]
Discuss-Discuss:

I could not sort out the real goals of this document.  I am unsure whether we are setting the stage for a BCP,
or whether this was supposed to be a BCP.  The document reiterates MUSTs and SHOULDs from the various
documents, and collecting this information into one document is a useful exercise, but it did not seem to add
a lot of new guidance.  What is the core message?

Actionable:

In section 4.2, Authentication Algorithm Selection (in the OSPFv2 section) states:

    Implementations must provide support for
  HMAC-SHA-256 as this will become the algorithm of choice.

I think this should really be HMAC-SHA-1.  This would be consistent with the guidance for all other protocols.
However, the remainder of 4.2 is consistent with the cited text.  Is there a good reason that OSPFv2 would
jump directly to HMAC-SHA-256 when all the other protocols are migrating to HMAC-SHA-1?
2010-09-23
04 Sean Turner
[Ballot comment]
1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction.

2) Section 2 …
[Ballot comment]
1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.  Keep the 2nd (that's where the RFC editor will put it).

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST), FIPS Publication 180-3: Secure Hash Standard, October 2008.

4) Sec 6: Is there something missing from the end of this sentence maybe "packet":

  If the Address Family Identifier of the
  first (and only the first) entry in the message is 0xFFFF, then the
  remainder of the entry contains the authentication.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-23
04 Sean Turner
[Ballot discuss]
1) Is this draft supposed to be a BCP instead of informational?  In the title it has "Best Practices" and in the last …
[Ballot discuss]
1) Is this draft supposed to be a BCP instead of informational?  In the title it has "Best Practices" and in the last sentence of the security considerations it has:

  We expect that new revisions of this document
  will be issued in the future to reflect current thinking on best
  practice in this area.

2) 2119 requirements language is used only to specify what's already in RFCs - shouldn't there be requirements about switching to a new algorithm?  If it's just listing what's out there now, then do that and remove all the talk about deprecating this or that algorithm.  If you're suggesting that algorithms be deprecated, then do that and use 2119 language.

3) Because there are no new recommendations this draft ought to called something like "A survey of IGP Crypto".  The purpose of this draft is very unclear to me.

4) If this document is in fact providing advice about the use of authentication in IGP implementations and deployments, ad the name of the document implies, then I agree with Adrian that the following issues need to be addressed:

- does an implementation support key change?
- how often is key change recommended?
- can key change be in-service?
- how many keys can be configured at once?
- how many keys can be active at once?
- can key change be dynamic (i.e. by a protocol)
- can dynamic key change be managed by the IGP or does it need a second protocol to manage the keys?
2010-09-23
04 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-09-23
04 Tim Polk
[Ballot discuss]
In section 4.2, Authentication Algorithm Selection (in the OSPFv2 section) states:

    Implementations must provide support for
  HMAC-SHA-256 as this will …
[Ballot discuss]
In section 4.2, Authentication Algorithm Selection (in the OSPFv2 section) states:

    Implementations must provide support for
  HMAC-SHA-256 as this will become the algorithm of choice.

I think this should really be HMAC-SHA-1
2010-09-23
04 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-09-23
04 Sean Turner
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction. …
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.  Keep the 2nd (that's where the RFC editor will put it).

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST), FIPS Publication 180-3: Secure Hash Standard, October 2008.

4) Sec 6: Is there something missing from the end of this sentence maybe "packet":

  If the Address Family Identifier of the
  first (and only the first) entry in the message is 0xFFFF, then the
  remainder of the entry contains the authentication.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-23
04 Sean Turner
[Ballot discuss]
1) Is this draft supposed to be a BCP instead of informational?  In the title it has "Best Practices" and in the last …
[Ballot discuss]
1) Is this draft supposed to be a BCP instead of informational?  In the title it has "Best Practices" and in the last sentence of the security considerations it has:

We expect that new revisions of this document
  will be issued in the future to reflect current thinking on best
  practice in this area.

2) 2119 requirements language is used only to specify what's already in RFCs - shouldn't there be requirements about switching?  If it's just listing what's out there now, then do that and remove all the talk about deprecating this or that algorithm.  If you're suggesting that algorithms be deprecated, then do that and use 2119 language.

3) Because there are no new recommendations this draft ought to called something like "A survey of IGP Crypto".  The purpose of this draft is very unclear to me.
2010-09-23
04 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-09-22
04 Robert Sparks
[Ballot discuss]
Amplifying others' discusses on the use of 2119 language in this document - as written, this document appears to be profiling other protocols, …
[Ballot discuss]
Amplifying others' discusses on the use of 2119 language in this document - as written, this document appears to be profiling other protocols, relaxing MUSTs. For example, section 4.1 calls out three MUSTs in 2328 and says that you only need implement one of them to be conformant. If something else formally changed the requirements for the other two, please provide a reference. If that hasn't happened yet, either this document needs to be on an entirely different track, or the language needs to be reworded to report on deployment and perhaps future standards work.
2010-09-22
04 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks
2010-09-22
04 Sean Turner
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction. …
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST), FIPS Publication 180-3: Secure Hash Standard, October 2008.

4) Can we add in the intro that picking/having one algorithm is normally a bad idea.  Protocols should support algorithm negotiation so they can support more than one algorithm.

5) Sec 6: Is there something missing from the end of this sentence maybe "packet":

  If the Address Family Identifier of the
  first (and only the first) entry in the message is 0xFFFF, then the
  remainder of the entry contains the authentication.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-22
04 Ralph Droms
[Ballot comment]
For consistency, add citations to the defining RFCs that define the use of
HMAC-SHA-256/HMAC-SHA-384/HMAC-SHA-512 in the various routing protocols; e.g.,

  Implementations may …
[Ballot comment]
For consistency, add citations to the defining RFCs that define the use of
HMAC-SHA-256/HMAC-SHA-384/HMAC-SHA-512 in the various routing protocols; e.g.,

  Implementations may start providing support for HMAC-SHA-256/HMAC-
  SHA-384/HMAC-SHA-512 [RFC5310] as these algorithms may be necessary in the
  future.

at the end of section 3.2
2010-09-22
04 Ralph Droms
[Ballot comment]
For consistency, add citations to the defining RFCs that define the use of HMAC-SHA-256/HMAC-SHA-384/HMAC-SHA-512 in the various routing protocols; e.g.,

  Implementations may …
[Ballot comment]
For consistency, add citations to the defining RFCs that define the use of HMAC-SHA-256/HMAC-SHA-384/HMAC-SHA-512 in the various routing protocols; e.g.,

  Implementations may start providing support for HMAC-SHA-256/HMAC-
  SHA-384/HMAC-SHA-512 [RFC5310} as these algorithms may be necessary in the
  future.

at the end of section 3.2
2010-09-22
04 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2010-09-22
04 Lars Eggert
[Ballot comment]
INTRODUCTION, paragraph 3:
>            Cryptographic Authentication Algorithm Implementation
>                    …
[Ballot comment]
INTRODUCTION, paragraph 3:
>            Cryptographic Authentication Algorithm Implementation
>                    Best Practices for Routing Protocols

  It is odd to see the term "best practices" in the title of a document
  that is not actually targeted as a BCP. Plus, the contents of the
  document aren't best practices, they are rather suggestions to
  implementors to avoid potential future interoperability issues.
  Suggest to reword the title.


Section 4.1, paragraph 4:
>    all conformant implentations MUST support this.

  Nit: s/implentations/implementations/


Section 11.1, paragraph 2:
>    [ISO]      "Intermediate system to Intermediate system routeing

  Nit: s/routeing/routing/
2010-09-22
04 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-09-21
04 Adrian Farrel
[Ballot comment]
Nit: Section 1

  It should be recognized that preferred algorithm(s) will change over
  time in to adapt to the evolving threats. …
[Ballot comment]
Nit: Section 1

  It should be recognized that preferred algorithm(s) will change over
  time in to adapt to the evolving threats.

s/time in/time/

---

Nit: Sections 3 and 4

s/use of SHA family/use of the SHA family/
                                                                                         
---

Nit: Section 3.1

s/scheme as provides/scheme as it provides/

---

Section 6

  RIPv2, originally specified in [RFC1388], then [RFC1723], has been
  finalized in STD56 [RFC2453].

For some definition of "final". Can you:
s/finalized in/updaed and published as/
2010-09-21
04 Adrian Farrel
[Ballot discuss]
I would like to  "Yes" on this document because I think it is a
valuable and important piece of work, but there is …
[Ballot discuss]
I would like to  "Yes" on this document because I think it is a
valuable and important piece of work, but there is a bunch of
issues that I think need to be addressed in a revision.

When these have been addressed, I will move to "Yes".

---

I agree with Sean's Comment about 2119 language. Not only is this an
Informational I-D, but it is referencing other sources to inherit
the use of this language. I recommend changing this to normal English
usage throughout, and dropping the (duplicated) 2119 boilerplate.

---

Section 3.1

  In order for IS-IS implementations to interoperate, they must support
  one or more authentication schemes in common.

This is not true as written! IS-IS implementations interoperate
perfectly well with the use of no authentication. It is possible that
you are assuming that "no authentication" *is* an authentication scheme,
but that sounds a little pedantica and rather confusing. So probably you
mean the "In order for IS-IS implementations to interoperate with the
use of security, they must..."

This subtle change in language should be applied throughout the
document (e.g. sections 4.1 and 4.2 - although, why is this text
duplicated in 4.1 and 4.2?)

---
                 
Section 3.1 observes that there is a use for cleartext passwords, but
then says that the IETF believes the use should be deprecated. Would it
not be better to say "this mechanism does not provide any significant
level of security." This language has the additional benefit that it
avoids the discussion of whether this document is a BCP or PS rather
than Informational.

The language in the OSPF section (4.1) to cover the same point is much
better.

Section 6.1 manages to be better and worse :-)

  Simple Password defined as a MUST in [RFC2453] should only be used
  when the operator wishes to preclude the accidental introduction of a
  RIP router into the domain. This authentication scheme is useful, but
  not when the operator wants to protect RIPv2 message exchange in a
  potentially hostile environment.
   
  Implementations MUST provide support for Simple Password, but its
  operational use is deprecated.

The first paragraph puts it nicely. The second paragraph:
- repeats the "MUST" which it does not need to do
- makes a deprecation statement that contradicts the utility stated in
  the first paragraph.

---

Section 4.1 and 6.1

  This section specifies the
  requirements for standards conformant OSPFv2 implementations, which
  desire to utilize the authentication feature.

The language used here is very different from that in section 3.1.
Why? Can you use the same advisory text that you have in 3.1?

---

Section 4.2

  Keyed MD5 as defined in [RFC2328] is a MUST. It is our belief that
  HMAC-SHA-1 and HMAC-SHA-256 as defined in [RFC5709] will likely be
  preferred in the future. Keyed MD5 MUST be implemented, but its use
  may be deprecated in future. Implementations must provide support for
  HMAC-SHA-256 as this will become the algorithm of choice.

1. There is some duplication of the MUST implement keyed MD5.

2. Is the final sentence a statement that can be referenced, or are
  you defining it here?                                               
  If you are defining it, then this is not an Informational I-D and
  becomes PS with review needed by the OSPF WG.
  I would prefer you to change this to be an observation.           

For example:                                                   

  [RFC2328] states that implementations must offer keyed MD5
  authentication. It is likely that this will be deprecated in favor of
  HMAC-SHA-1 and HMAC-SHA-256 [RFC5709] in future deployments, so new
  implementations should support these algorithms.

---

Section 5 on OSPFv3

  The algorithm requirements for AH and ESP are described in [RFC4835]
  and are not discussed here.

This is true, but why not discuss them here? After all, the
requirements for OSPFv2 security are described in other documents, but
you still discuss them in this document. I think you should state what
the required algorithm support is, and observe that you think this is
sufficient (or not).

Ditto Section 7 on RIPng.

---

Section 6.1

  Keyed-MD5 as defined in [RFC2082] is a MUST. However, [RFC2082] has
  been obsoleted by [RFC4822] Cryptographic Authentication. Compliant
  implementations MUST provide support for Keyed-MD5 as described in
  [RFC2082] but should recognize that this is superseded by
  Cryptographic Authentication as defined in [RFC4822]. 

This is a bit mixed up! RFC 2082 is obsolete so implementation should
not do anything as defined in that spec. They must conform to RFC 4822
which is quite clear on the requirements for MD5 and SHA, and which
also indicates the preferences between the schmes.

---

Dynamic key management is important and you cover it in Section 8.

  To ensure greater security, the keys used should be changed                 
  periodically and implementations MUST be able to store and use more
  than one key at the same time.

But this does not indicate whether the protocols actually support
changing keys. Shouldn't this be something covered in each of the
main sections 3 through 7?

What about automated key management?

Probably have a look at RFC 4107, and write some cosiderations of the
IGPs based on what it says.
2010-09-21
04 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-09-21
04 Sean Turner
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction. …
[Ballot comment]
These are drafty:

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST),
            FIPS Publication 180-3: Secure Hash Standard, October
            2008.

4) Can we add in the intro that picking/having one algorithm is normally a bad idea.  Protocols should support algorithm negotiation so they can support more than one algorithm.

5) Sec 6: Is there something missing from the end of this sentence maybe "packet":

  If the Address Family Identifier of the
  first (and only the first) entry in the message is 0xFFFF, then the
  remainder of the entry contains the authentication.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-21
04 Sean Turner
[Ballot discuss]
These are drafty:

1) Not entirely sure of this draft's point.  2119 requirements language is used only to specify what's already in RFCs …
[Ballot discuss]
These are drafty:

1) Not entirely sure of this draft's point.  2119 requirements language is used only to specify what's already in RFCs - shouldn't there be requirements about switching?

2) This is on the informational track, but the last sentence of the security consideration says:

We expect that new revisions of this document
  will be issued in the future to reflect current thinking on best
  practice in this area.

So is this a BCP cast as an informational document?
2010-09-21
04 Sean Turner
[Ballot discuss]
This is draft:

1) Not entirely sure of this drafts point.  2119 requirements language is used only to specify what's already in RFCs …
[Ballot discuss]
This is draft:

1) Not entirely sure of this drafts point.  2119 requirements language is used only to specify what's already in RFCs - shouldn't there be requirements about switching?

2) This is on the informational track, but the last sentence of the security consideration says:

We expect that new revisions of this document
  will be issued in the future to reflect current thinking on best
  practice in this area.

So is this a BCP cast as an informational document?
2010-09-21
04 Sean Turner
[Ballot comment]
These are drafts

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Just move them to the …
[Ballot comment]
These are drafts

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Just move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST),
            FIPS Publication 180-3: Secure Hash Standard, October
            2008.

4) Can we add in the intro that picking one algorithm is normally a bad idea.  Protocols should support algorithm negotiation so they can support more than one.

5) Sec 6: Is there something missing from the end of this sentence maybe "packet":

  If the Address Family Identifier of the
  first (and only the first) entry in the message is 0xFFFF, then the
  remainder of the entry contains the authentication.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-21
04 Sean Turner
[Ballot discuss]
This is draft:

1) Not entirely sure of this drafts point.  2119 requirements language is used only to specify what's already in RFCs …
[Ballot discuss]
This is draft:

1) Not entirely sure of this drafts point.  2119 requirements language is used only to specify what's already in RFCs - shouldn't there be requirements about switching?
2010-09-21
04 Sean Turner
[Ballot comment]
These are drafts

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Just move them to the …
[Ballot comment]
These are drafts

1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Just move them to the Introduction.

2) Section 2 and the "conventions used in this document" section are the same.

3) It's probably worth adding a reference to SHS (for the SHA family):

[SHS]  National Institute of Standards and Technology (NIST),
            FIPS Publication 180-3: Secure Hash Standard, October
            2008.

4) Can we add in the intro that picking one algorithm is normally a bad idea.  Protocols should support algorithm negotiation so they can support more than one.

5) Sec 3.1: r/scheme as provides no/scheme as it provides no
2010-09-21
04 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner
2010-09-21
04 Sean Turner [Ballot comment]
1) The RFC editor will make you scrub the references (i.e., [RFCXYZ]) from the abstract.  Just move them to the Introduction.
2010-09-19
04 Russ Housley
[Ballot comment]
Two spellings are used: "Null authentication" and "NULL
  authentication".  Please pick one.

  In the Introduction, I think it is better to …
[Ballot comment]
Two spellings are used: "Null authentication" and "NULL
  authentication".  Please pick one.

  In the Introduction, I think it is better to talk about the overall
  technique before particular algorithms like MD5.  Below I suggest
  rewording for 3rd and 4th and 5th paragrahs of the introduction.
 
    In a cryptographic authentication scheme, routers share a secret
    key which is used to generate a message authentication code for
    each of the protocol packets.  Today, message authentication codes
    often use a keyed MD5 digest.  The recent escalating series of
    attacks on MD5 raise concerns about its remaining useful lifetime.
    These attacks may not necessarily result in direct vulnerabilities
    for keyed MD5 digests as message authentication codes because the
    colliding message may not correspond to a syntactically correct
    protocol packet.  There is a however a need felt to deprecate MD5
    in favor of stronger message authentication code algorithms.
2010-09-19
04 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-09-15
04 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Sam Weiler.
2010-09-07
04 Amy Vezza State changed to Waiting for AD Go-Ahead from In Last Call by Amy Vezza
2010-09-06
04 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-09-06
04 Ron Bonica Ballot has been issued by Ron Bonica
2010-09-06
04 Ron Bonica Created "Approve" ballot
2010-09-06
04 Ron Bonica Placed on agenda for telechat - 2010-09-23 by Ron Bonica
2010-08-30
04 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Weiler
2010-08-30
04 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Weiler
2010-08-27
04 Amanda Baber IANA understands that this document doesn't require any actions.
2010-08-20
04 Cindy Morgan Last call sent
2010-08-20
04 Cindy Morgan State changed to In Last Call from Last Call Requested by Cindy Morgan
2010-08-20
04 Ron Bonica Last Call was requested by Ron Bonica
2010-08-20
04 (System) Ballot writeup text was added
2010-08-20
04 (System) Last call text was added
2010-08-20
04 (System) Ballot approval text was added
2010-08-20
04 Ron Bonica State Changes to Last Call Requested from Publication Requested by Ron Bonica
2010-07-12
04 Cindy Morgan [Note]: 'Joel Jaeggli (joelja@bogus.com) is the document shepherd.' added by Cindy Morgan
2010-07-12
04 Cindy Morgan
1.a

The Document Shepherd is Joel Jaeggli, Opsec WG co-chair. The Document
Shepherd has reviewed Draft 00 of
draft-ietf-opsec-igp-crypto-requirements and concluded that the
document is …
1.a

The Document Shepherd is Joel Jaeggli, Opsec WG co-chair. The Document
Shepherd has reviewed Draft 00 of
draft-ietf-opsec-igp-crypto-requirements and concluded that the
document is prepared for IESG review and publication as an
informational document.

1.b

The document was widely socialized within the routing area working
groups where protocol maintenance is being performed prior to
being brought to the opsec working group. With opsec working group input
the focus has changed somewhat for altering the cryptogrphica protocal
usage of igp protocols to enumerating what the likely requirements
should be and the basis for those recommendations.

1.c

Insofar as the the doucument shepherd is concerned, further review of
future changes in state of cryptogrphic protection for IGP and EGP
protocols should be performed in working groups tasked with the protocol
maintenance activities or in working groups chartered to solve the
cyrpto-problem, such as the karp working group. This document represents
the consensus view of the authors and the working group on what the
requirements for such protocols should be.

1.d

One concern of the shepherd is that the working title while accurate at
the inception of the document somewhat overstates the fairly modest
goals of the document in it's present form. The long form title is
altogether more representative of the goals of the document.

Cryptographic Authentication Algorithm Implementation
Best Practices for Routing Protocols

1.e

Working group consensus has been solidly behind this draft following
revision is it's current form. Since presentation of the Updated draft
in Aanuary the document has been accepted as a working group document
and subsequently lasted called. Serious objections were not raised in
either case.

Prior to the revision, the draft have been presented in the working
group meeting, discussed on the list, and had received contributions
from working-group participants, however concern with the scope and the
goal of changing protocol specifications in an ops area working group
had precluded acceptance.

1.f

No appeals or discontent are noted in the working group regarding the
current draft at this time.

1.g

IDnits notes the existence of several dated references many of which are
required for historical treatment of the subject matter. Not major nits
are noted.

1.h

The draft divides references between normative and informative. This
document's advancement is not blocked on the advancement of normatively
referenced material.

1.i

The draft makes no requests of IANA. Authentication methods (example
OSPFv2 RFC 2328 Appendix D) are typically reserved through an IANA
registry, so documents referencing this document or subsequent work will
make IANA requests as a product of recommendations made in this document.

1.j

No formal language schema is in use in this document.

1.k

Document Announcement Write-up

Summary:

The routing protocols Open Shortest Path First version 2 (OSPFv2)
[RFC2328], Intermediate System to Intermediate System (IS-IS) [ISO]
[RFC1195] and Routing Information Protocol (RIP) [RFC2453] currently
define Clear Text and MD5 (Message Digest 5) [RFC1321] methods for
authenticating protocol packets. Recently effort has been made to add
support for the SHA (Secure Hash Algorithm) family of hash functions
for the purpose of authenticating routing protocol packets for RIP
[RFC4822], IS-IS [RFC5310] and OSPF [RFC5709].

To encourage interoperability between disparate implementations, it
is imperative that we specify the expected minimal set of algorithms
thereby ensuring that there is at least one algorithm that all
implementations will have in common.

This document examines the current set of available algorithms with
interoperability and effective cryptographic authentication
protection being the principle considerations. Cryptographic
authentication of these routing protocols requires the availability
of the same algorithms in disparate implementations. It is desirable
that newly specified algorithms should be implemented and available
in routing protocol implementations because they may be promoted to
requirements at some future time.

Working Group Summary:

The document was accepted as a workring group item on the mailing list
on 1/24/2010.Working Group last call was performed for two weeks, ending
on 5/29/2010. With no objections.

Document Quality:

The document covers the use of cryptographic protections in five igp
protocols while it's is likely that the utility of recommendations made
in this document will age or be rendered obsolete at different rates.
Recommendations conveyed by the document are both informational in
nature and temporally limited.
2010-07-12
04 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-01-29
00 (System) New version available: draft-ietf-opsec-igp-crypto-requirements-00.txt