<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-bmp-over-tls-03" category="info" submissionType="independent" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="BMP over TLS (BMPS)">BMPS: Transport Layer Security for BGP Monitoring Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-over-tls-03"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Steven Clarke">
      <organization>Vodafone</organization>
      <address>
        <email>steven.clarke@vodafone.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="07"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>BMP over TLS</keyword>
    <keyword>BMPS</keyword>
    <abstract>
      <?line 58?>

<t>The BGP Monitoring Protocol (BMP) defines the communication between a BMP station and multiple routers, referred to as network elements (NEs). This document describes BMP over TLS, which uses Transport Layer Security (TLS) to ensure secure transport between the NE and the BMP monitoring station. It updates <xref target="RFC7854"/> regarding BMP session establishment and termination.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as defined in <xref target="RFC7854"/>, facilitates communication between NEs and a BMP station. Keeping this communication secure is important because it includes sharing sensitive information about BGP peers and monitored prefixes.</t>
      <t>The  <xref section="11" sectionFormat="of" target="RFC7854"/> , "Security Considerations" acknowledges that while routes in public networks are generally not confidential, BGP is also utilized in private L3VPN <xref target="RFC4364"/> networks where confidentiality is crucial. It highlights that without mutual authentication through secure transport mechanisms, the channel is vulnerable to various attacks and recommends using IPSec <xref target="RFC4303"/> in tunnel mode with pre-shared keys for enhanced security in such scenarios.</t>
      <t>Additionally, a recent draft proposal, <xref target="I-D.ietf-grow-bmp-tcp-ao"/>, titled "TCP-AO Protection for BGP Monitoring Protocol (BMP)" suggests an alternative approach using the TCP Authentication Option <xref target="RFC5925"/>. This method authenticates the endpoints of the TCP session, thereby safeguarding its integrity. TCP-AO is beneficial in situations where full IPSec security may not be feasible, although unlike IPSec, it does not encrypt the session traffic.</t>
      <t>Alternatively, Transport Layer Security (TLS), offers endpoint authentication, data encryption, and data integrity defined in the Transport Layer Security (TLS) Protocol Version 1.3 <xref target="RFC8446"/>.</t>
      <t>The BGP Monitoring Protocol (BMP) <xref target="RFC7854"/> relies on the TCP protocol to establish BGP sessions between routers.  There are ongoing discussions within the IETF <xref target="I-D.draft-liu-grow-bmp-over-quic"/> to replace TCP with the QUIC protocol <xref target="RFC9000"/>. QUIC brings many features compared to TCP including security, the support of multiple streams or datagrams.</t>
      <t>QUIC is suitable for BMP transport <xref target="I-D.draft-liu-grow-bmp-over-quic"/> and has the potential to replace a BMP connection for each "logical router" by a single QUIC connection with streams for the messages from each "logical router". However it's deployment is dependent on the adoption of QUIC in router management stacks which have historically lagged behind server developments due to their cautious approach and slower development rate.</t>
      <t>This document describes how BMP can operate over TCP/TLS.  Experience in implementing BGP over TLS/TCP <xref target="I-D.draft-wirtgen-bgp-tls"/> showed that this is less costly than porting a BGP implementation over QUIC and the similarities suggest that the same is true for BMP.</t>
      <t>This document describes how to utilize TLS to secure BMP sessions between a monitoring station (acting as the server) and a Network Element (acting as the client). Unlike BGP, where either side can act as the server, BMP's role distinction simplifies the implementation of TLS in a client-server model. Henceforth, the term BMP over TLS will be referred to as BMPS.</t>
    </section>
    <section anchor="bmp-over-tls-bmps">
      <name>BMP over TLS (BMPS)</name>
      <section anchor="operational-summary">
        <name>Operational Summary</name>
        <t>The operation of BMPS is virtually the same as the original BMP specification defined in <xref target="RFC7854"/>, but with an additional layer of security using TLS.</t>
        <t>In BMPS, the BMP station functions as the TLS server, while NEs act as TLS clients. Following the completion of the TCP three-way handshake, as defined in <xref section="3.4" sectionFormat="of" target="RFC793"/>, each NE, functioning as a TLS client, initiates a TLS handshake with the BMP monitoring station, acting as the TLS server. Once the TLS connection is successfully established, NEs can immediately start transmitting BMP messages, as there is no separate BMP initiation or handshake phase.</t>
        <t>The following steps summarize the operational flow of BMPS:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates and completes a TCP handshake.</t>
          </li>
          <li>
            <t>The NE initiates and completes a TLS handshake with the BMP monitoring station.</t>
          </li>
          <li>
            <t>BMP messages are transmitted by the NE according to <xref target="RFC7854"/>.</t>
          </li>
        </ol>
        <t>A BMPS session ends when the underlying TCP or TLS session is terminated for any reason.</t>
        <t>The <xref section="3.2" sectionFormat="of" target="RFC7854"/> states, "No BMP message is ever sent from the monitoring station to the router." To adhere to this standard, the monitoring station MUST listen on separate ports for BMP (non-TLS) and BMPS (TLS) sessions. This approach also offers a simplified "make before break" migration from BMP to BMPS.</t>
      </section>
      <section anchor="transport-layer-security">
        <name>Transport Layer Security</name>
        <t>In regular TLS connections, the server has a TLS certificate along with a public/private key pair, whereas the client does not.</t>
        <t>For BMP over TLS (BMPS), it is REQUIRED to implement mutual TLS (mTLS), wherein both the server (BMP station) and the client (network element) have certificates, and both sides authenticate each other using their respective public/private key pairs.</t>
        <t>A self-signed "root" TLS certificate is REQUIRED for mTLS, allowing an organization to act as its own certificate authority. The certificates issued to both the BMP station and NEs should correspond to this root certificate.</t>
        <t>The operational flow of BMP over TLS is similar to standard TLS operations:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates the connection to the BMP station.</t>
          </li>
          <li>
            <t>The station presents its TLS certificate.</t>
          </li>
          <li>
            <t>The NE verifies the station's certificate.</t>
          </li>
          <li>
            <t>The NE presents its TLS certificate.</t>
          </li>
          <li>
            <t>The station verifies the NE's certificate.</t>
          </li>
          <li>
            <t>The TLS connection is established.</t>
          </li>
          <li>
            <t>The NE begins transmitting BMP data to the station over the encrypted TLS channel.</t>
          </li>
        </ol>
        <t>TLS version 1.3, defined in <xref target="RFC8446"/>, streamlines the handshake process and supports more robust cipher suites compared to the previous versions, enhancing both speed and security.</t>
        <t>The BMPS is REQUIRED to support TLS 1.3 which has become a dominant standard.</t>
      </section>
      <section anchor="operational-recommendations-for-bmps">
        <name>Operational Recommendations for BMPS</name>
        <t>The BMP over TLS (BMPS) is RECOMMENDED as an alternative mechanism to safeguard BMP sessions in scenarios where alternative protections like IPSec may not be feasible or deployed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The BMPS implementation increases computational demands due to continuous encryption and decryption processes, resulting in high CPU utilization and potential vulnerability to denial-of-service attacks.</t>
      <t>The TLS cipher suites that provide only data integrity validation without encryption SHOULD NOT be used by default.</t>
      <t>The BMPS implementation SHOULD follow the best practices and recommendations for using TLS, as per the Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) as defined in <xref target="RFC7525"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2818">
          <front>
            <title>HTTP Over TLS</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2818"/>
          <seriesInfo name="DOI" value="10.17487/RFC2818"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="I-D.ietf-grow-bmp-tcp-ao">
          <front>
            <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
            <author fullname="Hemant Sharma" initials="H." surname="Sharma">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   This document outlines the utilization of the TCP Authentication
   Option (TCP-AO), as specified in [RFC5925], for the authentication of
   BGP Monitoring Protocol (BMP) sessions, as specified in [RFC7854].
   TCP-AO provides for the authentication of BMP sessions established
   between routers and BMP stations at the TCP layer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tcp-ao-02"/>
        </reference>
        <reference anchor="I-D.draft-liu-grow-bmp-over-quic">
          <front>
            <title>Using BMP over QUIC connection</title>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   The BGP Monitoring Protocol (BMP) provides a convenient interface
   for obtaining route views by monitoring BGP sessions. BMP operates
   over TCP and is unidirectional (from client to server). QUIC
   provides multiple simultaneous streams to carry data in one
   direction, enabling much better efficiency and performance for both
   peers, in particular unidirectional streams can provide reverse data
   protection for the sender. QUIC also provides shorter handshake and
   includes TLS. This document describes how to use BMP over the QUIC
   transport protocol, named BMPoQUIC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-liu-grow-bmp-over-quic-02"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="I-D.draft-wirtgen-bgp-tls">
          <front>
            <title>BGP over TLS/TCP</title>
            <author fullname="Thomas Wirtgen" initials="T." surname="Wirtgen">
              <organization>UCLouvain</organization>
            </author>
            <author fullname="Olivier Bonaventure" initials="O." surname="Bonaventure">
              <organization>UCLouvain &amp; WELRI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies the utilization of TCP/TLS to support BGP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wirtgen-bgp-tls-03"/>
        </reference>
      </references>
    </references>
    <?line 148?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is the result of studying all the referenced RFCs and drawing some parallels from PCEPS <xref target="RFC8253"/>, leading to the specification for BMP over TLS (BMPS).</t>
      <t>We are grateful to the contributors of the RFCs listed in the References section. Their work has been instrumental in shaping and inspiring the development of this specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
