<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-bmp-tcp-ao-03" category="info" submissionType="independent" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="TCP-AO for BMP">TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-tcp-ao-03"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Jeffrey Haas">
      <organization>Juniper Networks</organization>
      <address>
        <email>jhaas@juniper.net</email>
      </address>
    </author>
    <date year="2024" month="April" day="11"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>TCP-AO for BMP</keyword>
    <abstract>
      <?line 40?>

<t>This document outlines the utilization of the TCP Authentication Option (TCP-AO), as specified in RFC5925, for the authentication of BGP Monitoring Protocol (BMP) sessions, as specified in RFC7854. TCP-AO provides for the authentication of BMP sessions established between routers and BMP stations at the TCP layer.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/>
        <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as specified in <xref target="RFC7854"/>, recommends the use of IPsec <xref target="RFC4303"/> to address security considerations concerning the BMP session between a router and the BMP station managing BGP route collection. This document suggests the use of the TCP Authentication Option (TCP-AO) as an authentication mechanism to ensure end-to-end authentication of BMP sessions between the routers and the BMP stations. TCP-AO is also the choice of authentication for TCP-based network protocols such as BGP and LDP. A comprehensive discussion of TCP-AO is provided in <xref target="RFC5925"/>.</t>
    </section>
    <section anchor="tcp-ao-protection-for-bgp-monitoring-protocol-bmp">
      <name>TCP-AO Protection for BGP Monitoring Protocol (BMP)</name>
      <t>The BGP Monitoring Protocol (BMP), defined in <xref target="RFC7854"/>, plays a crucial role in network management by allowing routers to share information about their BGP RIBs.  This helps operators monitor and troubleshoot their networks effectively. However, the security considerations associated with BMP have become increasingly critical in light of evolving threats. This document proposes that these threats be addressed by utilizing TCP-AO to safeguard BMP sessions.</t>
      <t>TCP-AO provides protection against spoofed TCP segments and helps protect the integrity of the TCP session.  Further, it provides for the authentication of session endpoints.  Similar to BGP, BMP can benefit from these security properties.</t>
      <t>TCP-AO helps protect the integrity of BMP session liveness at the TCP layer.  As outlined in <xref section="3.2" sectionFormat="of" target="RFC7854"/>, BMP operates as a unidirectional protocol, meaning no BMP messages are transmitted from the monitoring station to the monitored router.  BMP relies on the underlying TCP session, supported by TCP keepalives <xref target="RFC1122"/>, to prevent session timeouts from the station to the monitored router.</t>
      <section anchor="operational-recommendations-for-bmp">
        <name>Operational Recommendations for BMP</name>
        <t>The implementation and use of TCP-AO to protect BMP session is RECOMMENDED in circumstances where the session might not otherwise be protected by alternative mechanisms such as IPsec.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TCP-AO is not intended as a direct substitute for IPsec, nor is it suggested as such in this document.  The Security Considerations for TCP-AO in <xref section="11" sectionFormat="of" target="RFC7854"/> all apply to its application for BMP.</t>
      <t>TCP-AO may inhibit connectionless resets when session keys have been lost or changed.  This may cause BMP sessions to linger in some circumstances; however, BGP shares this consideration.</t>
      <t>In the presence of NAT, TCP-AO requires additional support as defined in <xref target="RFC6978"/>.</t>
      <t>TCP-AO does not provide for privacy for the BMP protocol's contents.  When this is desired, IPsec with Encapsulating Security Payload (ESP) can help provide for such privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC6978">
          <front>
            <title>A TCP Authentication Option Extension for NAT Traversal</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through Network Address Translators and/or Network Address and Port Translators (NATs/NAPTs). This extension changes the data used to compute traffic keys, but it does not alter TCP-AO's packet processing or key generation algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6978"/>
          <seriesInfo name="DOI" value="10.17487/RFC6978"/>
        </reference>
      </references>
    </references>
    <?line 87?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is an outcome of the experiences gained through implementing BMP. While TCP-AO safeguards other TCP protocols, BMP currently lacks the same level of protection.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
