On 4/11/2011 12:49 PM, Stephen Kent wrote:
At 9:30 PM -0700 4/6/11, Brian Weis wrote:
On Apr 6, 2011, at 5:46 PM, Randy Bush wrote:

Getting a new application (such as the rtr protocol) specifying
hmac-md5 mandatory to implement through a Secdir review and then the
Security ADs just won't happen. The only exception I can think of is
if there were no possible alternatives, and that's obviously not the
case here.

with AO not implemented on any servers, routers not having ssh
libraries, and this being a server to router protocol, what are the
alternatives?

randy

I'm surprised IPsec hasn't been mentioned in this thread ... was it
previously discussed and rejected? Correct me if I'm wrong, but I
believe it's common for BGP routers to support IPsec and servers
definitely support IPsec. On the router side, one or two IPsec
sessions to servers should not be a burden. I'm less sure of the
server IPsec scaling properties, but I would expect a LINUX or BSD
kernel to have the scaling issues as were discussed earlier in this
thread regarding SSH but I'm no expert here.

Brian

A few years ago we were told by vendors that many router implementations
of IPsec were available only to traffic passing through a router, not to
the
control plane terminating in a router. Unless that has changed, IPsec is
not a good candidate here.

FWIW, that was an artifact of the IPsec requirements for routers. 4301 has the following requirements:

(end sec 4.1, RFC 4301):
   In summary,

   a) A host implementation of IPsec MUST support both transport and
      tunnel mode.  This is true for native, BITS, and BITW
      implementations for hosts.

   b) A security gateway MUST support tunnel mode and MAY support
      transport mode.  If it supports transport mode, that should be
      used only when the security gateway is acting as a host, e.g., for
      network management, or to provide security between two
      intermediate systems along a path.

A gateway acts as a host for all its routing protocol connections, and thus its control plane should have to comply with (a).

I agree, that's why IPsec isn't a good choice to protect BGP, but we sort of created that situation in 4301, AFAICT.

Joe
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to