netsec-sig - [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft
Subject: Internet2 Network Security SIG
List archive
- From: gcbrowni <>
- To:
- Subject: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft
- Date: Thu, 30 Mar 2017 12:14:49 -0400
- Ironport-phdr: 9a23:D8f2jRC8qCpEX61oN62rUyQJP3N1i/DPJgcQr6AfoPdwSPX6rsbcNUDSrc9gkEXOFd2CrakV1qyG4uuxCCQp2tWoiDg6aptCVhsI2409vjcLJ4q7M3D9N+PgdCcgHc5PBxdP9nC/NlVJSo6lPwWB6nK94iQPFRrhKAF7Ovr6GpLIj8Swyuu+54Dfbx9GiTe5Yb5+Nha7oAHeusQShYZpN7o8xAbOrnZUYepd2HlmJUiUnxby58ew+IBs/iFNsP8/9MBOTLv3cb0gQbNXEDopPWY15Nb2tRbYVguA+mEcUmQNnRVWBQXO8Qz3UY3wsiv+sep9xTWaMMjrRr06RTiu86FmQwLuhSwaNTA27XvXh9Rwgq1Hrx2vuh9xzYDKbo+SL/d+cb/RfdYASGpBQspcVSpMCZ68YYsVCOoBOP5Vr4bhqFQVtxu+AgetBOXuyjRVgXL20rE13P87EQHB0g0gGdMOvW/brNXxM6cdSvq6zK3OzTXEc/xawzb96JXSfh8/vP6MQKt9fMzMwkchEAPFi0+fqY3jPz6N1OQNrm6b7+t4Ve2xkW4rsQdxrSazxss0i4nJgJ4VxU7e9SV/3ok1OcO0RFRlbtG5DZtcrzqVN5FxQsw+WW5npTg1xqcatp68eSgG0JUnyADDa/yJaYSI5QjjVOmJLThkhXJlY66whxGo/Ue8ze38U9G430pUoSpfjtnArHcN1wbc6sWBV/Bz/V+h1C6S2w3c7uxIO104mKvbJpI737I9mJUevV7CEyLygEn7jaCbel859uWm5OnreKjqq56AO4Nulw3zPLoil8qiCuoiKAcORXKU+eGk2b3j40L5RLJKg+UzkqbDsZDaIdkXqre/AwBL3Icv8Rm/Dy2g0NQfgXYLNlNFeA+dg4f3Jl7OPej0Dfa5g1uyjDdm3+3KM7LlD5nXM3TOkbfscaxg50NSxwc/19FS6pZMBrEEOv3zW0vxtNLCDh8+Ngy52+nnB8lm2YMEXmKODKmZMKLJvF+H4uIvJPKDa5URuDb7LPgq++TijX4kmVMHY6amwIYXZGiiHvt6O0WZfWbsgtAZHGcRoAUxUPHqiEeDUT5PZ3e+Rqw95j4gBYKiDIfDXZytgKef0CuhH51WYHxGBU6WEXfuaYqER+kAZDiMLcB8jzxXHYSmHpQs3gy0tRPrjqVoBuvS5iACs5//jp546/CAuws18Gl7BM6H1H6LTikgkWgCXTgp2qFXrkh6wF6H169zxf1FU9Ff+qUaAU8BKZfAwrkiWJjJUQXbc4LRRQ==
Hello folks! Here’s the next draft paper, on MD5 & TCP-AO. Views seemed strong on both sides, from the survey, so I tried to do a decent job presenting both sides of the MD5 issue. As always, and feedback is appreciated, -G MD5 & TCP-AO, as applied to BGP sessions, can spark considerable debate within the R&E community. Both are used to authenticate BGP sessions, ensuring you are brining up the BGP session with the peer you think you mean to. RFC 2385 describes the MD5 technique, while RFC 5925 and 5926 discuss TCP-AO. Section 5.1 of RFC 7454 discusses MD5 & TCP-AO. It notes that TCP-AO should be used instead of MD5, but that some vendor implementations may make that difficult. It also mentions, briefly, operational concerns of both MD5 & TCP-AO. It ends up suggested that they be used "where appropriate." The debate around the issues usually comes down around four points: TCP-AO is not supported, MD5 is not secure, it's quite difficult to support operationally, and its generally not needed on a point-to-point connection. Point One: TCP-AO support among the vendors is not as strong as it could be. The Juniper MX series just doesn't support TCP-AO. And nor does Cisco IOS-IOS-XR. Brocade marketing claims support for TCP-AO, but the documentation seems to be lacking. Needless to say, you can't implement the preferred option if it's not supported on your platform. Point Two: MD5 is no longer secure. Since 2008, there has been some talk that the MD5 hash is no longer secure. Essentially, the argument goes, MD5 hashing has a weakness with collisions, and on top of that is salted and very fast ... traits not always welcome when you're trying to make things hard on attackers. There's even a CERT article on it. Others would argue that MD5 is still a good solution as long as you select a password that's not in rainbow table. Point Three: Point to Point is pretty secure already. The weakness around MD5 for collisions comes in to play here, in two ways. On a point to point connection there's not much, if any opportunity for someone to intercept you packets. Hash collisions are unlikely when there are only two speakers on the wire, mitigating the risk of using MD5. Which begs the question, if there are only two speakers on the wire then why are you using MD5 anyway? Point Four: MD5 can be a pain, operationally. The thought of enabling MD5 fills some operations staff with dread. It requires creating and storing, and perhaps even rotating, secure passwords. There's also the very real risk of a session not coming back up; there's more than one anecdote about BGP sessions remaining down after router maintenance because of issues/bugs/etc with the MD5 passwords. Engineers tend to raise their eyebrows when security improvements end up causing downtime. Concerns are also sometimes raised about the CPU-intensive nature of it, as well as "log storms" during transition events. Many people within the community use MD5 authentication and have had little to no trouble, with others reporting concerns. Sites will need to weigh the pros and cons carefully before making a decision. Juniper Example JUNos uses a two-step process where you first define a key-choin, with the password, and then apply that key-chain to the BGP neighbor i question using the authentication-key-chain and authentication-algorithm commands. bgp { group ext { type external; peer-as 65530; neighbor 172.16.2.1; authentication-key-chain bgp-auth; authentication-algorithm md5; authentication-key-chains { key-chain bgp-auth { tolerance 30; key 0 { secret "$9$5TJDi….F6A"; ## SECRET-DATA start-time “2011-6-23.20:19:33 -0700”; } key 1 { secret "$9JGDiqW….puh."; ## SECRET-DATA start-time “2012-6-23.20:19:33 -0700”; Juniper has a pretty good article description their MD5 option at: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/bgp-authentication.html Cisco Example Cisco makes the configuration fairly simple, simply noting the password in the config section for the neighbor ... which is then obfuscated in the config. router bgp 65500 neighbor 192.0.2.1 remote-as 65555 password encrypted 123abc Cisco has an article on how to configure MD5 at: Brocade Example The Brocade configurationis similiar to Cisco, just applying a password to the session which is then obfuscated in the config. router bgp local-as 1111 neighbor 10.10.200.10 remote-as 1 neighbor 10.10.200.102 password abc12 Brocades article on MD5 can be found at: |
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
- [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, gcbrowni, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, Steven Wallace, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, Andrew Gallo, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, Andrew Gallo, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, Michael H Lambert, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, David Farmer, 03/30/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, gcbrowni, 03/31/2017
- Re: [Security-WG] I2 - MD5/TCP-AO Discussion Paper, draft, David Farmer, 03/30/2017
Archive powered by MHonArc 2.6.19.