<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-grow-bmp-over-tls-00" category="info" submissionType="independent" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="BMP over TLS (BMPS)">BMPS: Transport Layer Security for BGP Monitoring Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-grow-bmp-over-tls-00"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Steven Clarke">
      <organization>Vodafone</organization>
      <address>
        <email>steven.clarke@vodafone.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="08"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>BMP over TLS</keyword>
    <keyword>BMPS</keyword>
    <abstract>
      <?line 58?>

<t>The BGP Monitoring Protocol (BMP) defines the communication between a BMP station and multiple routers, referred to as network elements (NEs). This document describes BMP over TLS, which uses Transport Layer Security (TLS) to ensure secure transport between the NE and the BMP monitoring station. It updates <xref target="RFC7854"/> regarding BMP session establishment and termination.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as defined in <xref target="RFC7854"/>, facilitates communication between NEs and a BMP station. Keeping this communication secure is important because it includes sharing sensitive information about BGP peers and monitored prefixes.</t>
      <t>The  <xref section="11" sectionFormat="of" target="RFC7854"/> , "Security Considerations" acknowledges that while routes in public networks are generally not confidential, BGP is also utilized in private L3VPN <xref target="RFC4364"/> networks where confidentiality is crucial. It highlights that without mutual authentication through secure transport mechanisms, the channel is vulnerable to various attacks and recommends using IPSec <xref target="RFC4303"/> in tunnel mode with pre-shared keys for enhanced security in such scenarios.</t>
      <t>Additionally, a recent draft proposal, <xref target="I-D.ietf-grow-bmp-tcp-ao"/>, titled "TCP-AO Protection for BGP Monitoring Protocol (BMP)" suggests an alternative approach using the TCP Authentication Option <xref target="RFC5925"/>. This method authenticates the endpoints of the TCP session, thereby safeguarding its integrity. TCP-AO is beneficial in situations where full IPSec security may not be feasible, although unlike IPSec, it does not encrypt the session traffic.</t>
      <t>Alternatively, Transport Layer Security (TLS), offers endpoint authentication, data encryption, and data integrity defined in the Transport Layer Security (TLS) Protocol Version 1.3 <xref target="RFC8446"/>.</t>
      <t>The BGP Monitoring Protocol (BMP) <xref target="RFC7854"/> relies on the TCP protocol to establish BGP sessions between routers.  There are ongoing discussions within the IETF <xref target="I-D.draft-liu-grow-bmp-over-quic"/> to replace TCP with the QUIC protocol <xref target="RFC9000"/>. QUIC brings many features compared to TCP including security, the support of multiple streams or datagrams.</t>
      <t>QUIC is suitable for BMP transport <xref target="I-D.draft-liu-grow-bmp-over-quic"/> and has the potential to replace a BMP connection for each "logical router" by a single QUIC connection with streams for the messages from each "logical router". However it's deployment is dependent on the adoption of QUIC in router management stacks which have historically lagged behind server developments due to their cautious approach and slower development rate.</t>
      <t>This document describes how BMP can operate over TCP/TLS.  Experience in implementing BGP over TLS/TCP <xref target="I-D.draft-wirtgen-bgp-tls"/> showed that this is less costly than porting a BGP implementation over QUIC and the similarities suggest that the same is true for BMP.</t>
      <t>This document describes how to utilize TLS to secure BMP sessions between a monitoring station (acting as the server) and a Network Element (acting as the client). Unlike BGP, where either side can act as the server, BMP's role distinction simplifies the implementation of TLS in a client-server model. Henceforth, the term BMP over TLS will be referred to as BMPS.</t>
    </section>
    <section anchor="bmp-over-tls-bmps">
      <name>BMP over TLS (BMPS)</name>
      <section anchor="operational-summary">
        <name>Operational Summary</name>
        <t>The operation of BMPS is virtually the same as the original BMP specification defined in <xref target="RFC7854"/>, but with an additional layer of security using TLS.</t>
        <t>In BMPS, the BMP station functions as the TLS server, while NEs act as TLS clients. Following the completion of the TCP three-way handshake, as defined in <xref section="3.4" sectionFormat="of" target="RFC793"/>, each NE, functioning as a TLS client, initiates a TLS handshake with the BMP monitoring station, acting as the TLS server. Once the TLS connection is successfully established, NEs can immediately start transmitting BMP messages, as there is no separate BMP initiation or handshake phase.</t>
        <t>The following steps summarize the operational flow of BMPS:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates and completes a TCP handshake.</t>
          </li>
          <li>
            <t>The NE initiates and completes a TLS handshake with the BMP monitoring station.</t>
          </li>
          <li>
            <t>BMP messages are transmitted by the NE according to <xref target="RFC7854"/>.</t>
          </li>
        </ol>
        <t>A BMPS session ends when the underlying TCP or TLS session is terminated for any reason.</t>
        <t>The <xref section="3.2" sectionFormat="of" target="RFC7854"/> states, "No BMP message is ever sent from the monitoring station to the router." To adhere to this standard, the monitoring station MUST listen on separate ports for BMP (non-TLS) and BMPS (TLS) sessions. This approach also offers a simplified "make before break" migration from BMP to BMPS.</t>
      </section>
      <section anchor="transport-layer-security">
        <name>Transport Layer Security</name>
        <t>In regular TLS connections, the server has a TLS certificate along with a public/private key pair, whereas the client does not.</t>
        <t>For BMP over TLS (BMPS), it is REQUIRED to implement mutual TLS (mTLS), wherein both the server (BMP station) and the client (network element) have certificates, and both sides authenticate each other using their respective public/private key pairs.</t>
        <t>A self-signed "root" TLS certificate is REQUIRED for mTLS, allowing an organization to act as its own certificate authority. The certificates issued to both the BMP station and NEs should correspond to this root certificate.</t>
        <t>The operational flow of BMP over TLS is similar to standard TLS operations:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates the connection to the BMP station.</t>
          </li>
          <li>
            <t>The station presents its TLS certificate.</t>
          </li>
          <li>
            <t>The NE verifies the station's certificate.</t>
          </li>
          <li>
            <t>The NE presents its TLS certificate.</t>
          </li>
          <li>
            <t>The station verifies the NE's certificate.</t>
          </li>
          <li>
            <t>The TLS connection is established.</t>
          </li>
          <li>
            <t>The NE begins transmitting BMP data to the station over the encrypted TLS channel.</t>
          </li>
        </ol>
        <t>TLS version 1.3, defined in <xref target="RFC8446"/>, streamlines the handshake process and supports more robust cipher suites compared to the previous versions, enhancing both speed and security.</t>
        <t>The BMPS is REQUIRED to support TLS 1.3 which has become a dominant standard.</t>
      </section>
      <section anchor="operational-recommendations-for-bmps">
        <name>Operational Recommendations for BMPS</name>
        <t>The BMP over TLS (BMPS) is RECOMMENDED as an alternative mechanism to safeguard BMP sessions in scenarios where alternative protections like IPSec may not be feasible or deployed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The BMPS implementation increases computational demands due to continuous encryption and decryption processes, resulting in high CPU utilization and potential vulnerability to denial-of-service attacks.</t>
      <t>The TLS cipher suites that provide only data integrity validation without encryption SHOULD NOT be used by default.</t>
      <t>The BMPS implementation SHOULD follow the best practices and recommendations for using TLS, as per the Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) as defined in <xref target="RFC7525"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2818">
          <front>
            <title>HTTP Over TLS</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2818"/>
          <seriesInfo name="DOI" value="10.17487/RFC2818"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="I-D.ietf-grow-bmp-tcp-ao">
          <front>
            <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
            <author fullname="Hemant Sharma" initials="H." surname="Sharma">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   This document outlines the utilization of the TCP Authentication
   Option (TCP-AO), as specified in [RFC5925], for the authentication of
   BGP Monitoring Protocol (BMP) sessions, as specified in [RFC7854].
   TCP-AO provides for the authentication of BMP sessions established
   between routers and BMP stations at the TCP layer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tcp-ao-02"/>
        </reference>
        <reference anchor="I-D.draft-liu-grow-bmp-over-quic">
          <front>
            <title>Using BMP over QUIC connection</title>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   The BGP Monitoring Protocol (BMP) provides a convenient interface
   for obtaining route views by monitoring BGP sessions. BMP operates
   over TCP and is unidirectional (from client to server). QUIC
   provides multiple simultaneous streams to carry data in one
   direction, enabling much better efficiency and performance for both
   peers, in particular unidirectional streams can provide reverse data
   protection for the sender. QUIC also provides shorter handshake and
   includes TLS. This document describes how to use BMP over the QUIC
   transport protocol, named BMPoQUIC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-liu-grow-bmp-over-quic-02"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="I-D.draft-wirtgen-bgp-tls">
          <front>
            <title>BGP over TLS/TCP</title>
            <author fullname="Thomas Wirtgen" initials="T." surname="Wirtgen">
              <organization>UCLouvain</organization>
            </author>
            <author fullname="Olivier Bonaventure" initials="O." surname="Bonaventure">
              <organization>UCLouvain &amp; WELRI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies the utilization of TCP/TLS to support BGP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wirtgen-bgp-tls-03"/>
        </reference>
      </references>
    </references>
    <?line 148?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is the result of studying all the referenced RFCs and drawing some parallels from PCEPS <xref target="RFC8253"/>, leading to the specification for BMP over TLS (BMPS).</t>
      <t>We are grateful to the contributors of the RFCs listed in the References section. Their work has been instrumental in shaping and inspiring the development of this specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
