<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-grow-bmp-tcp-ao-00" category="std" submissionType="IETF" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="TCP-AO for BMP">TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tcp-ao-00"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Jeffrey Haas">
      <organization>Juniper Networks</organization>
      <address>
        <email>jhaas@juniper.net</email>
      </address>
    </author>
    <date year="2024" month="August" day="22"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>TCP-AO for BMP</keyword>
    <abstract>
      <?line 45?>

<t>This document outlines the utilization of the TCP Authentication Option (TCP-AO), as specified in <xref target="RFC5925"/>, for the authentication of BGP Monitoring Protocol (BMP) sessions, as specified in <xref target="RFC7854"/>. TCP-AO provides for the authentication of BMP sessions established between routers and BMP stations at the TCP layer.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/>
        <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as specified in <xref target="RFC7854"/>, recommends the use of IPsec <xref target="RFC4303"/> to address security considerations concerning the BMP session between a router and the BMP station managing BGP route collection. This document suggests the use of the TCP Authentication Option (TCP-AO) as an authentication mechanism to ensure end-to-end authentication of BMP sessions between the routers and the BMP stations. TCP-AO is also the choice of authentication for TCP-based network protocols such as BGP and LDP. A comprehensive discussion of TCP-AO is provided in <xref target="RFC5925"/>.</t>
    </section>
    <section anchor="tcp-ao-protection-for-bgp-monitoring-protocol-bmp">
      <name>TCP-AO Protection for BGP Monitoring Protocol (BMP)</name>
      <t>The BGP Monitoring Protocol (BMP), defined in <xref target="RFC7854"/>, plays a crucial role in network management by allowing routers to share information about their BGP RIBs.  This helps operators monitor and troubleshoot their networks effectively. However, the security considerations associated with BMP have become increasingly critical in light of evolving threats. This document proposes that these threats be addressed by utilizing TCP-AO to safeguard BMP sessions.</t>
      <t>TCP-AO provides protection against spoofed TCP segments and helps protect the integrity of the TCP session.  Further, it provides for the authentication of session endpoints.  Similar to BGP, BMP can benefit from these security properties.</t>
      <t>TCP-AO helps protect the integrity of BMP session liveness at the TCP layer.  As outlined in <xref section="3.2" sectionFormat="of" target="RFC7854"/>, BMP operates as a unidirectional protocol, meaning no BMP messages are transmitted from the monitoring station to the monitored router.  BMP relies on the underlying TCP session, supported by TCP keepalives <xref target="RFC1122"/>, to prevent session timeouts from the station to the monitored router.</t>
      <section anchor="operational-recommendations-for-bmp">
        <name>Operational Recommendations for BMP</name>
        <t>The implementation and use of TCP-AO to protect BMP session is RECOMMENDED in circumstances where the session might not otherwise be protected by alternative mechanisms such as IPsec.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TCP-AO is not intended as a direct substitute for IPsec, nor is it suggested as such in this document.  The Security Considerations for TCP-AO in <xref section="11" sectionFormat="of" target="RFC7854"/> all apply to its application for BMP.</t>
      <t>TCP-AO may inhibit connectionless resets when session keys have been lost or changed.  This may cause BMP sessions to linger in some circumstances; however, BGP shares this consideration.</t>
      <t>In the presence of NAT, TCP-AO requires additional support as defined in <xref target="RFC6978"/>.</t>
      <t>TCP-AO does not provide for privacy for the BMP protocol's contents.  When this is desired, IPsec with Encapsulating Security Payload (ESP) can help provide for such privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC6978">
          <front>
            <title>A TCP Authentication Option Extension for NAT Traversal</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through Network Address Translators and/or Network Address and Port Translators (NATs/NAPTs). This extension changes the data used to compute traffic keys, but it does not alter TCP-AO's packet processing or key generation algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6978"/>
          <seriesInfo name="DOI" value="10.17487/RFC6978"/>
        </reference>
      </references>
    </references>
    <?line 92?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is an outcome of the experiences gained through implementing BMP. While TCP-AO safeguards other TCP protocols, BMP currently lacks the same level of protection.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
