Movatterモバイル変換


[0]ホーム

URL:


[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

INFORMATIONAL
Network Working Group                                        S. BellovinRequest for Comments: 4278                            AT&T Labs ResearchCategory: Informational                                         A. Zinin                                                                 Alcatel                                                            January 2006Standards Maturity Variance Regarding the TCP MD5 Signature Option(RFC 2385) and the BGP-4 SpecificationStatus of This Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2006).Abstract   The IETF Standards Process requires that all normative references for   a document be at the same or higher level of standardization.RFC2026section 9.1 allows the IESG to grant a variance to the standard   practices of the IETF.  This document explains why the IESG is   considering doing so for the revised version of the BGP-4   specification, which refers normatively toRFC 2385, "Protection of   BGP Sessions via the TCP MD5 Signature Option".RFC 2385 will remain   at the Proposed Standard level.1.  Introduction   The IETF Standards Process [RFC2026] requires that all normative   references for a document be at the same or higher level of   standardization.RFC 2026 section 9.1 allows the IESG to grant a   variance to the standard practices of the IETF.  Pursuant to that, it   is considering publishing the updated BGP-4 specification [RFC4271]   as Draft Standard, despite the normative reference to [RFC2385],   "Protection of BGP Sessions via the TCP MD5 Signature Option".RFC2385 will remain a Proposed Standard.  (Note that although the title   of [RFC2385] includes the word "signature", the technology described   in it is commonly known as a Message Authentication Code or MAC, and   should not be confused with digital signature technologies.)   [RFC2385], which is widely implemented, is the only transmission   security mechanism defined for BGP-4.  Other possible mechanisms,   such as IPsec [RFC2401] and TLS [RFC2246], are rarely, if ever, usedBellovin & Zinin             Informational                      [Page 1]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 2006   for this purpose.  Given the long-standing requirement for security   features in protocols, it is not possible to advance BGP-4 without a   mandated security mechanism.   The conflict of maturity levels between specifications would normally   be resolved by advancing the specification being referred to along   the standards track, to the level of maturity that the referring   specification needs to achieve.  However, in the particular case   considered here, the IESG believes that [RFC2385], though adequate   for BGP deployments at this moment, is not strong enough for general   use, and thus should not be progressed along the standards track.  In   this situation, the IESG believes that variance procedure should be   used to allow the updated BGP-4 specification to be published as   Draft Standard.   The following sections of the document give detailed explanations of   the statements above.2.  Draft Standard Requirements   The requirements for Proposed Standards and Draft Standards are given   in [RFC2026].  For Proposed Standards, [RFC2026] warns that:        Implementors should treat Proposed Standards as immature        specifications.  It is desirable to implement them in order to        gain experience and to validate, test, and clarify the        specification.  However, since the content of Proposed Standards        may be changed if problems are found or better solutions are        identified, deploying implementations of such standards into a        disruption-sensitive environment is not recommended.   In other words, it is considered reasonable for flaws to be   discovered in Proposed Standards.   The requirements for Draft Standards are higher:        A Draft Standard must be well-understood and known to be quite        stable, both in its semantics and as a basis for developing an        implementation.   In other words, any document that has known deficiencies should not   be promoted to Draft Standard.Bellovin & Zinin             Informational                      [Page 2]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 20063.  The TCP MD5 Signature Option   [RFC2385], despite its 1998 publication date, describes a Message   Authentication Code (MAC) that is considerably older.  It utilizes a   technique known as a "keyed hash function", using MD5 [RFC1321] as   the hash function.  When the original code was developed, this was   believed to be a reasonable technique, especially if the key was   appended (rather than prepended) to the data being protected.  But   cryptographic hash functions were never intended for use as MACs, and   later cryptanalytic results showed that the construct was not as   strong as originally believed [PV1,PV2].  Worse yet, the underlying   hash function, MD5, has shown signs of weakness [Dobbertin,Wang].   Accordingly, the IETF community has adopted Hashed Message   Authentication Code (HMAC) [RFC2104], a scheme with provable security   properties, as its standard MAC.   Beyond that, [RFC2385] does not include any sort of key management   technique.  Common practice is to use a password as a shared secret   between pairs of sites, but this is not a good idea [RFC3562].   Other problems are documented in [RFC2385] itself, including the lack   of a type code or version number, and the inability of systems using   this scheme to accept certain TCP resets.   Despite the widespread deployment of [RFC2385] in BGP deployments,   the IESG has thus concluded that it is not appropriate for use in   other contexts.  [RFC2385] is not suitable for advancement to Draft   Standard.4.  Usage Patterns forRFC 2385   Given the above analysis, it is reasonable to ask why [RFC2385] is   still used for BGP.  The answer lies in the deployment patterns   peculiar to BGP.   BGP connections inherently tend to travel over short paths.  Indeed,   most external BGP links are one hop.  Although internal BGP sessions   are usually multi-hop, the links involved are generally inhabited   only by routers rather than general-purpose computers; general-   purpose computers are easier for attackers to use as TCP hijacking   tools [Joncheray].   Also, BGP peering associations tend to be long-lived and static.  By   contrast, many other security situations are more dynamic.   This is not to say that such attacks cannot happen.  (If they   couldn't happen at all, there would be no point to any security   measures.)  Attackers could divert links at layers 1 or 2, or theyBellovin & Zinin             Informational                      [Page 3]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 2006   could (in some situations) use Address Resolution Protocol (ARP)   spoofing at Ethernet-based exchange points.  Still, on balance, BGP   is employed in an environment that is less susceptible to this sort   of attack.   There is another class of attack against which BGP is extremely   vulnerable:  false route advertisements from more than one autonomous   system (AS) hop away.  However, neither [RFC2385] nor any other   transmission security mechanism can block such attacks.  Rather, a   scheme such as S-BGP [Kent] would be needed.5.  LDP   The Label Distribution Protocol (LDP) [RFC3036] also uses [RFC2385].   Deployment practices for LDP are very similar to those of BGP: LDP   connections are usually confined within a single autonomous system   and most frequently span a single link between two routers.  This   makes the LDP threat environment very similar to BGP's.  Given this,   and a considerable installed base of LDP in service provider   networks, we are not deprecating [RFC2385] for use with LDP.6.  Security Considerations   The IESG believes that the variance described here will not adversely   affect the security of the Internet.7.  Conclusions   Given the above analysis, the IESG is persuaded that waiving the   prerequisite requirement is the appropriate thing to do.  [RFC2385]   is clearly not suitable for Draft Standard.  Other existing   mechanisms, such as IPsec, would do its job better.  However, given   the current operational practices in service provider networks at the   moment -- and in particular the common use of long-lived standard   keys, [RFC3562] notwithstanding --  the marginal benefit of such   schemes in this situation would be low, and not worth the transition   effort.  We would prefer to wait for a security mechanism tailored to   the major threat environment for BGP.8.  Informative References   [Dobbertin]  H. Dobbertin, "The Status of MD5 After a Recent Attack",                RSA Labs' CryptoBytes, Vol. 2 No. 2, Summer 1996.   [Joncheray]  Joncheray, L.  "A Simple Active Attack Against TCP."                Proceedings of the Fifth Usenix Unix Security Symposium,                1995.Bellovin & Zinin             Informational                      [Page 4]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 2006   [Kent]       Kent, S., C. Lynn, and K. Seo.  "Secure Border Gateway                Protocol (Secure-BGP)."  IEEE Journal on Selected Areas                in Communications, vol. 18, no. 4, April, 2000, pp.                582-592.   [RFC3562]    Leech, M., "Key Management Considerations for the TCP                MD5 Signature Option",RFC 3562, July 2003.   [PV1]        B. Preneel and P. van Oorschot, "MD-x MAC and building                fast MACs from hash functions," Advances in Cryptology                --- Crypto 95 Proceedings, Lecture Notes in Computer                Science Vol. 963, D. Coppersmith, ed., Springer-Verlag,                1995.   [PV2]        B. Preneel and P. van Oorschot, "On the security of two                MAC algorithms," Advances in Cryptology --- Eurocrypt 96                Proceedings, Lecture Notes in Computer Science, U.                Maurer, ed., Springer-Verlag, 1996.   [RFC1321]    Rivest, R., "The MD5 Message-Digest Algorithm ",RFC1321, April 1992.   [RFC2026]    Bradner, S., "The Internet Standards Process -- Revision                3",BCP 9,RFC 2026, October 1996.   [RFC2104]    Krawczyk, H., Bellare, M., and R. Canetti, "HMAC:                Keyed-Hashing for Message Authentication",RFC 2104,                February 1997.   [RFC2246]    Dierks, T. and C. Allen, "The TLS Protocol Version 1.0",RFC 2246, January 1999.   [RFC2385]    Heffernan, A., "Protection of BGP Sessions via the TCP                MD5 Signature Option",RFC 2385, August 1998.   [RFC2401]    Kent, S. and R. Atkinson, "Security Architecture for the                Internet Protocol",RFC 2401, November 1998.   [RFC3036]    Andersson, L., Doolan, P., Feldman, N., Fredette, A.,                and B. Thomas, "LDP Specification",RFC 3036, January                2001.   [RFC4271]    Rekhter, Y., Li, T., and S. Hares, Eds., "A Border                Gateway Protocol 4 (BGP-4)",RFC 4271, January 2006.   [Wang]       Wang, X. and H. Yu, "How to Break MD5 and Other Hash                Functions."  Proceedings of Eurocrypt '05, 2005.Bellovin & Zinin             Informational                      [Page 5]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 2006Authors' Addresses   Steven M. Bellovin   Department of Computer Science   Columbia University   1214 Amsterdam Avenue, M.C. 0401   New York, NY 10027-7003   Phone: +1 212-939-7149   EMail: bellovin@acm.org   Alex Zinin   Alcatel   701 E Middlefield Rd   Mountain View, CA 94043   EMail: zinin@psg.comBellovin & Zinin             Informational                      [Page 6]

RFC 4278    Standards Maturity Variance:RFC 2385 and BGP-4 January 2006Full Copyright Statement   Copyright (C) The Internet Society (2006).   This document is subject to the rights, licenses and restrictions   contained inBCP 78, and except as set forth therein, the authors   retain all their rights.   This document and the information contained herein are provided on an   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Intellectual Property   The IETF takes no position regarding the validity or scope of any   Intellectual Property Rights or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; nor does it represent that it has   made any independent effort to identify any such rights.  Information   on the procedures with respect to rights in RFC documents can be   found inBCP 78 andBCP 79.   Copies of IPR disclosures made to the IETF Secretariat and any   assurances of licenses to be made available, or the result of an   attempt made to obtain a general license or permission for the use of   such proprietary rights by implementers or users of this   specification can be obtained from the IETF on-line IPR repository athttp://www.ietf.org/ipr.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights that may cover technology that may be required to implement   this standard.  Please address the information to the IETF at   ietf-ipr@ietf.org.Acknowledgement   Funding for the RFC Editor function is provided by the IETF   Administrative Support Activity (IASA).Bellovin & Zinin             Informational                      [Page 7]

[8]ページ先頭

©2009-2025 Movatter.jp