<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-bmp-tcp-ao-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-tcp-ao-01"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="04"/>
    <keyword>BMP Security</keyword>
    <keyword>TCP-AO for BMP</keyword>
    <abstract>
      <?line 28?>

<t>This document outlines the utilization of the Transmission Control Protocol - Authentication Option (TCP-AO), as prescribed in RFC5925, for the authentication of Border Gateway Protocol Monitoring Protocol (BMP) sessions, as specified in RFC7854. The intent is to heighten security within the underlying Transmission Control Protocol (TCP) transport layer, ensuring the authentication of BMP sessions established between routers and BMP stations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao"/>.</t>
    </note>
  </front>
  <middle>
    <?line 33?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as specified in RFC7854, recommends employing Internet Protocol Security (IPSec) from RFC4303 to mitigate security concerns related to the Transmission Control Protocol (TCP) session between routers and the BMP station managing BGP route collection. Recognizing the practical limitations of IPSec, this document underscores the preference for the use of Transmission Control Protocol - Authentication Option (TCP-AO) as the authentication method of choice for TCP-based network protocols such as BGP and LDP. A comprehensive discussion of TCP-AO is provided in RFC5925.</t>
    </section>
    <section anchor="tcp-ao-protection-for-bgp-monitoring-protocol-bmp">
      <name>TCP-AO Protection for BGP Monitoring Protocol (BMP)</name>
      <t>The BGP Monitoring Protocol (BMP) outlined in RFC7854 plays a crucial role in network management by allowing routers to share information about their BGP tables, helping operators monitor and troubleshoot their networks effectively. However, the security considerations associated with BMP have become increasingly critical in light of evolving cyber threats. This document proposes that these concerns be addressed by introducing a framework that utilizes the Transmission Control Protocol - Authentication Option (TCP-AO), specified in RFC5925, to safeguard BMP sessions.</t>
      <t>Extending this security measure to BMP helps mitigate risks associated with unauthorized access, tampering, and other potential security vulnerabilities. By integrating TCP-AO into BMP implementations, network operators can establish a more resilient and trustworthy foundation for BGP monitoring activities.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the BMP session gets a boost with TCP-AO, seamlessly implemented over the existing TCP transport, ensuring heightened protection without any additional load.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC5925">
        <front>
          <title>The TCP Authentication Option</title>
          <author fullname="J. Touch" initials="J." surname="Touch"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5925"/>
        <seriesInfo name="DOI" value="10.17487/RFC5925"/>
      </reference>
      <reference anchor="RFC7854">
        <front>
          <title>BGP Monitoring Protocol (BMP)</title>
          <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
          <author fullname="R. Fernando" initials="R." surname="Fernando"/>
          <author fullname="S. Stuart" initials="S." surname="Stuart"/>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7854"/>
        <seriesInfo name="DOI" value="10.17487/RFC7854"/>
      </reference>
    </references>
    <?line 55?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a result of BMP integration into the network. While TCP-AO safeguards other TCP protocols, BMP lacks the same level of protection within this context.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
