<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-grow-bmp-tcp-ao-01" category="std" submissionType="IETF" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="TCP-AO for BMP">TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tcp-ao-01"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Jeffrey Haas">
      <organization>Juniper Networks</organization>
      <address>
        <email>jhaas@juniper.net</email>
      </address>
    </author>
    <date year="2025" month="February" day="23"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>TCP-AO for BMP</keyword>
    <abstract>
      <?line 45?>

<t>This document outlines the utilization of the TCP Authentication Option (TCP-AO), as specified in <xref target="RFC5925"/>, for the authentication of BGP Monitoring Protocol (BMP) sessions, as specified in <xref target="RFC7854"/>. TCP-AO provides for the authentication of BMP sessions established between routers and BMP stations at the TCP layer.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/>
        <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as specified in <xref target="RFC7854"/>, recommends the use of IPsec <xref target="RFC4303"/> to address security considerations concerning the BMP session between a router and the BMP station managing BGP route collection. This document suggests the use of the TCP Authentication Option (TCP-AO) as an authentication mechanism to ensure end-to-end authentication of BMP sessions between the routers and the BMP stations. TCP-AO is also the choice of authentication for TCP-based network protocols such as BGP and LDP. A comprehensive discussion of TCP-AO is provided in <xref target="RFC5925"/>.</t>
    </section>
    <section anchor="tcp-ao-protection-for-bgp-monitoring-protocol-bmp">
      <name>TCP-AO Protection for BGP Monitoring Protocol (BMP)</name>
      <t>The BGP Monitoring Protocol (BMP), defined in <xref target="RFC7854"/>, plays a crucial role in network management by allowing routers to share information about their BGP RIBs.  This helps operators monitor and troubleshoot their networks effectively. However, the security considerations associated with BMP have become increasingly critical in light of evolving threats. This document proposes that these threats be addressed by utilizing TCP-AO to safeguard BMP sessions.</t>
      <t>TCP-AO provides protection against spoofed TCP segments and helps protect the integrity of the TCP session.  Further, it provides for the authentication of session endpoints.  Similar to BGP, BMP can benefit from these security properties.</t>
      <t>TCP-AO helps protect the integrity of BMP session liveness at the TCP layer.  As outlined in <xref section="3.2" sectionFormat="of" target="RFC7854"/>, BMP operates as a unidirectional protocol, meaning no BMP messages are transmitted from the monitoring station to the monitored router.  BMP relies on the underlying TCP session, supported by TCP keepalives <xref target="RFC1122"/>, to prevent session timeouts from the station to the monitored router.</t>
      <section anchor="operational-recommendations-for-bmp">
        <name>Operational Recommendations for BMP</name>
        <t>The implementation and use of TCP-AO to protect BMP session is RECOMMENDED in circumstances where the session might not otherwise be protected by alternative mechanisms such as IPsec.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TCP-AO is not intended as a direct substitute for IPsec, nor is it suggested as such in this document.  The Security Considerations for TCP-AO in <xref section="11" sectionFormat="of" target="RFC7854"/> all apply to its application for BMP.</t>
      <t>TCP-AO may inhibit connectionless resets when session keys have been lost or changed.  This may cause BMP sessions to linger in some circumstances; however, BGP shares this consideration.</t>
      <t>In the presence of NAT, TCP-AO requires additional support as defined in <xref target="RFC6978"/>.</t>
      <t>TCP-AO does not provide for privacy for the BMP protocol's contents.  When this is desired, IPsec with Encapsulating Security Payload (ESP) can help provide for such privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC6978">
          <front>
            <title>A TCP Authentication Option Extension for NAT Traversal</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through Network Address Translators and/or Network Address and Port Translators (NATs/NAPTs). This extension changes the data used to compute traffic keys, but it does not alter TCP-AO's packet processing or key generation algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6978"/>
          <seriesInfo name="DOI" value="10.17487/RFC6978"/>
        </reference>
      </references>
    </references>
    <?line 92?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is an outcome of the experiences gained through implementing BMP. While TCP-AO safeguards other TCP protocols, BMP currently lacks the same level of protection.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
