One document matched: draft-ovsienko-babel-hmac-authentication-02.xml


<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdepth="2"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="no" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<rfc category="exp" updates="6126" docName="draft-ovsienko-babel-hmac-authentication-02" ipr="trust200902">

	<front>
		<title>Babel HMAC Cryptographic Authentication</title>
		<author fullname="Denis Ovsienko" initials="D." surname="Ovsienko">
			<organization>Yandex</organization>
			<address>
				<postal>
					<street>16, Leo Tolstoy St.</street>
					<city>Moscow</city>
					<region></region>
					<code>119021</code>
					<country>Russia</country>
				</postal>
				<email>infrastation@yandex.ru</email>
			</address>
		</author>
		<date year="2013" />
		<keyword>routing protocol</keyword>
		<keyword>authentication</keyword>
		<keyword>applied cryptography</keyword>
		<abstract>
			<t>This document describes a cryptographic authentication mechanism for Babel
			routing protocol, updating, but not superceding RFC 6126. The mechanism
			allocates two new TLV types for the authentication data, uses HMAC and is
			both optional and backward compatible.</t>
		</abstract>
	</front>

	<middle>
		<section title="Introduction">
			<t>Comments are solicited and should be addressed to the author.</t>
			<t>Authentication of routing protocol exchanges is a common mean of
			securing computer networks. Use of protocol authentication mechanisms helps
			in ascertaining that only the intended routers participate in routing
			information exchange, and that the exchanged routing information is not
			modified by a third party.</t>
			<t><xref target="BABEL" /> ("the original specification") defines data
			structures, encoding, and operation of a basic Babel routing protocol
			instance ("instance of the original protocol"). This document ("this
			specification") defines data structures, encoding, and operation of an
			extension to Babel protocol, an authentication mechanism ("this
			mechanism"). Both the instance of the original protocol and this mechanism
			are mostly self-contained and interact only at coupling points defined in
			this specification.</t>
			<t>A major design goal of this mechanism is such a transparency to an
			operator that is not affected by implementation and configuration
			specifics. A complying implementation makes all meaningful details of
			authentication-specific processing clear to the operator, even when some
			of the key parameters cannot be changed.</t>
			<t>The currently established (see <xref target="RIP2-AUTH" />,
			<xref target="OSPF2-AUTH" />, <xref target="OSPF3-AUTH" />, and
			<xref target="RFC6039" />) approach to authentication mechanism design for
			datagram-based routing protocols such as Babel relies on two principal data
			items embedded into protocol packets, typically as two integral parts of
			a single data structure:
			<list style="symbols">
				<t>A fixed-length unsigned integer number, typically called a
				cryptographic sequence number, used in replay attack protection.</t>
				<t>A variable-length sequence of octets, a result of the HMAC construct
				(see <xref target="RFC2104" />) computed on meaningful data items of the
				packet (including the cryptographic sequence number) on one hand and a
				secret key on another, used in proving that both the sender and the
				receiver share the same secret key and that the meaningful data was not
				changed in transmission.</t>
			</list>
			Depending on the design specifics either all protocol packets are
			authenticated or only those protecting the integrity of protocol exchange.
			This mechanism authenticates all protocol packets.</t>
			<t>This specification defines the use of the cryptographic sequence number
			in details sufficient to make replay attack protection strength
			predictable. That is, an operator can tell the strength from the declared
			characteristics of an implementation and, whereas the implementation allows
			changing relevant parameters, the effect of a reconfiguration.</t>
			<t>This mechanism explicitly allows for multiple HMAC results per an
			authenticated packet. Since meaningful data items of a given packet remain
			the same, each such HMAC result stands for a different secret key and/or
			a different hash algorithm. This enables a simultaneous, independent
			authentication within multiple domains.</t>
			<t>An important concern addressed by this mechanism is limiting the
			amount of HMAC computations done per an authenticated packet, independently
			for sending and receiving. Without these limits the number of computations
			per a packet could be as high as number of configured authentication keys
			(in sending case) or as the number of keys multiplied by the number of
			supplied HMAC results (in receiving case).</t>
			<t>These limits establish a basic competition between the configured keys
			and (in receiving case) an additional competition between the supplied HMAC
			results. This specification defines related data structures and procedures
			in a way to make such competition transparent and predictable for an
			operator.</t>
			<t>Wherever this specification mentions the operator reading or changing a
			particular data structure, variable, parameter, or event counter "at
			runtime", it is up to the implementer how this is to be done. For example,
			the implementation can employ an interactive CLI, or a management protocol
			such as SNMP, or an inter-process communication mean such as a local socket,
			or a combination of these.</t>
			<section title="Requirements Language">
				<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
				"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
				document are to be interpreted as described in <xref target="RFC2119">
				RFC 2119</xref>.</t>
			</section>
		</section>

		<section title="Cryptographic Aspects">
			<section anchor="hashalgos" title="Mandatory-to-Implement and Optional Hash Algorithms">
				<t><xref target="RFC2104" /> defines HMAC as a construct that can use any
				cryptographic hash algorithm with known digest length and internal block
				size. This specification preserves this property of HMAC by defining data
				processing that itself does not depend on any particular hash algorithm
				either. However, since this mechanism is a protocol extension case, there
				are relevant design considerations to take into account.</t>
				<t>Section 4.5 of <xref target="RFC6709" /> suggests selecting
				one hash algorithm as mandatory-to-implement for the purpose of global
				interoperability (Section 3.2 ibid.) and selecting another of distinct
				lineage as recommended for implementation for the purpose of cryptographic
				agility. This specification makes the latter property guaranteed, rather
				than probable, through elevation of requirement level. There are two hash
				algorithms mandatory-to-implement, unambiguously defined and generally
				available in multiple implementations each.</t>
				<t>An implementation of this mechanism MUST include support for two hash
				algorithms:
				<list style="symbols">
					<t>SHA-512 (SHA-2 family)</t>
					<t>Whirlpool (512-bit hash)</t>
				</list></t>
				<t>Besides that, an implementation of this mechanism MAY include support
				for additional hash algorithms, provided each such algorithm is publicly
				and openly specified and its digest length is 16 octets or more (to meet
				the constraint set in <xref target="hmac_tlv" />). Implementers SHOULD
				consider strong,
				well-known hash algorithms as additional implementation options and MUST
				NOT consider hash algorithms for that by the time of implementation
				meaningful attacks exist or that are commonly viewed as deprecated. For
				example, the following hash algorithms meet these requirements at the time
				of this writing (in alphabetical order):
				<list style="symbols">
					<t>GOST (256-bit hash)</t>
					<t>RIPEMD-160</t>
					<t>SHA-224 (SHA-2 family)</t>
					<t>SHA-256 (SHA-2 family)</t>
					<t>SHA-384 (SHA-2 family)</t>
					<t>Tiger (192-bit hash)</t>
				</list>
				The set of hash algorithms available in an implementation MUST be
				clearly stated. Whether known weak authentication keys exist for a hash
				algorithm used in the HMAC construct, an implementation
				MUST deny a use of such keys.</t>
			</section>
			<section title="Padding Constant Specifics">
				<t><xref target="RIP2-AUTH" /> established a reference method of routing
				protocol packets authentication using the HMAC construct. The method sets
				that a protocol packet being authenticated is sized and structured in a
				way to contain a data space purposed for the authentication data. Before
				processing the packet with the HMAC computation the data space is filled
				with some data a receiver of the packet can reproduce exactly, typically
				involving an arbitrary number known as a padding constant. After the HMAC
				computation the data space inside the packet is overwritten with the
				resulting authentication data.</t>
				<t>The padding constant used in <xref target="RIP2-AUTH" /> is 0x878FE1F3
				four-octet value. Subsequent works (including <xref target="OSPF2-AUTH" />
				and <xref target="OSPF3-AUTH" />) inherited both the method and the padding
				constant value. In particular, <xref target="OSPF3-AUTH" /> uses a source
				IPv6 address to set the first 16 octets of the padded area and the padding
				constant to set any subsequent octets. This mechanism makes the same use
				for the source IPv6 address, but the padding constant size and value are
				different.</t>
				<t>Since any fixed arbitrary value of a padding constant does not affect
				cryptographic characteristics of a hash algorithm and the HMAC
				construct, and since single-octet padding is more straightforward to
				implement, the padding constant used by this mechanism is 0x00 single-octet
				value. This is respectively addressed in sending
				(<xref target="tx_procedure" /> item 5) and receiving
				(<xref target="rx_procedure" /> item 6) procedures.</t>
			</section>
			<section anchor="cryptoseqno" title="Cryptographic Sequence Number Specifics">
				<t>Operation of this mechanism may involve multiple local and multiple
				remote cryptographic sequence numbers, each essentially being a 48&nbhy;bit
				unsigned integer. This specification uses a term "TS/PC number" to avoid
				confusion with the route's sequence number of the original Babel
				specification (Section 2.5 of <xref target="BABEL" />) and to stress the
				fact that there are two distinguished parts of this 48&nbhy;bit number, each
				handled in its specific way (see <xref target="tspcmgmt" />):</t>
				<figure>
					<artwork align="left">
 0                   1     2 3                   4
 0 1 2 3 4 5 6 7 8 9 0 //  9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+-+-+-//+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         TS         //         |              PC               |
+-+-+-+-+-+-+-+-+-+-//+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                   //
					</artwork>
					<postamble>High-order 32 bits are called "timestamp" (TS) and low-order
					16 bits are called "packet counter" (PC).</postamble>
				</figure>
				<t>This mechanism stores, updates, compares, and encodes each TS/PC number
				as two independent unsigned integers, TS and PC respectively. Such
				comparison of TS/PC numbers performed in item 3 of
				<xref target="rx_procedure" /> is algebraically equivalent to comparison
				of respective 48&nbhy;bit unsigned integers. Any byte order conversion, when
				required, is performed on TS and PC parts independently.</t>
			</section>
			<section anchor="hmac" title="Definition of HMAC">
				<t>The algorithm description below uses the following nomenclature, which
				is consistent with <xref target="FIPS-198"></xref>:
				<list style="hanging" hangIndent="7">
					<t hangText="Text">Is the data on which the HMAC is calculated (note item
					(b) of <xref target="security" />). In this specification it is the
					contents of a Babel packet ranging from the beginning of the Magic field
					of the Babel packet header to the end of the last octet of the Packet
					Body field, as defined in Section 4.2 of <xref target="BABEL" />.</t>
					<t hangText="H">Is the specific hash algorithm (see
					<xref target="hashalgos" />).</t>
					<t hangText="K">Is a sequence of octets of an arbitrary, known length.</t>
					<t hangText="Ko">Is the cryptographic key used with the hash algorithm.</t>
					<t hangText="B">Is the block size of H, measured in octets rather than
					bits. Note that B is the internal block size, not the digest length.</t>
					<t hangText="L">Is the digest length of H, measured in octets rather than
					bits.</t>
					<t hangText="XOR">Is the bitwise exclusive-or operation.</t>
					<t hangText="Opad">Is the hexadecimal value 0x5c repeated B times.</t>
					<t hangText="Ipad">Is the hexadecimal value 0x36 repeated B times.</t>
				</list></t>
				<t>The algorithm below is the original, unmodified HMAC construct as
				defined in both <xref target="RFC2104" /> and <xref target="FIPS-198" />,
				hence it is different from the algorithms defined in
				<xref target="RIP2-AUTH" />, <xref target="OSPF2-AUTH" />, and
				<xref target="OSPF3-AUTH" /> in exactly two regards:
				<list style="symbols">
					<t>Algorithm below sets the size of Ko to B, not to L (L is not greater
					than B). This resolves both ambiguity in XOR expressions and
					incompatibility in handling of keys having length greater than L but not
					greater than B.</t>
					<t>Algorithm below does not change value of Text before or after the
					computation. Both padding of a Babel packet before the computation and
					placing of the result inside the packet are performed elsewhere.</t>
				</list>
				The intent of this is to enable the most straightforward use of
				cryptographic libraries by implementations of this specification. At the
				time of this writing implementations of the original HMAC construct coupled
				with hash algorithms of choice are generally available.</t>
				<t>Description of the algorithm:
				<list style="numbers">
					<t>Preparation of the Key<vspace blankLines="1" />
					In this application, Ko is always B octets long. If K is B octets long,
					then Ko is set to K. If K is more than B octets long, then Ko is set to
					H(K) with necessary amount of zeroes appended to the end of H(K), such that Ko is B octets
					long. If K is less than B octets long, then Ko is set to K with zeroes
					appended to the end of K, such that Ko is B octets long.</t>
					<t>First-Hash
					<figure>
						<preamble>A First-Hash, also known as the inner hash, is computed as
						follows:</preamble>
						<artwork align="center">
First-Hash = H(Ko XOR Ipad || Text)
						</artwork>
					</figure></t>
					<t>Second-Hash
					<figure>
						<preamble>A second hash, also known as the outer hash, is computed as
						follows:</preamble>
						<artwork align="center">
Second-Hash = H(Ko XOR Opad || First-Hash)
						</artwork>
					</figure></t>
					<t>Result<vspace blankLines="1" />
					The resulting Second-Hash becomes the authentication data that is
					returned as the result of HMAC calculation.</t>
				</list>
				</t>
			</section>
		</section>

		<section title="Updates to Protocol Data Structures">
			<section anchor="RxAuthRequired" title="RxAuthRequired">
				<t>RxAuthRequired is a boolean parameter, its default value MUST be TRUE.
				An implementation SHOULD make RxAuthRequired a per-interface parameter,
				but MAY make it specific to the whole protocol instance. The conceptual
				purpose of RxAuthRequired is to enable a smooth migration from an
				unauthenticated to an authenticated Babel packet exchange and back (see
				<xref target="migration" />). Current value of RxAuthRequired directly
				affects the receiving procedure defined in <xref target="rx_procedure" />.
				An implementation SHOULD allow the operator changing RxAuthRequired value
				at runtime or by means of Babel speaker restart. An implementation MUST
				allow the operator discovering the effective value of RxAuthRequired at
				runtime or from the system documentation.</t>
			</section>
			<section title="LocalTS">
				<t>LocalTS is a 32-bit unsigned integer variable, it is the TS part of a
				per-interface TS/PC number. LocalTS is a strictly per-interface variable
				not intended to be changed by operator. Its initialization is explained
				in <xref target="tspcmgmt" />.</t>
			</section>
			<section title="LocalPC">
				<t>LocalPC is a 16-bit unsigned integer variable, it is the PC part of a
				per-interface TS/PC number. LocalPC is a strictly per-interface variable
				not intended to be changed by operator. Its initialization is explained
				in <xref target="tspcmgmt" />.</t>
			</section>
			<section anchor="mdi" title="MaxDigestsIn">
				<t>MaxDigestsIn is an unsigned integer parameter conceptually purposed for
				limiting the amount of CPU time spent processing a received authenticated
				packet. The receiving procedure performs the most CPU-intensive
				operation, the HMAC computation, only at most MaxDigestsIn
				(<xref target="rx_procedure" /> item 7) times for a given packet.</t>
				<t>MaxDigestsIn value MUST be at least 2. An implementation SHOULD make
				MaxDigestsIn a per-interface parameter, but MAY make it specific to the
				whole protocol instance. An implementation SHOULD allow the operator
				changing the value of MaxDigestsIn at runtime or by means of Babel speaker
				restart. An implementation MUST allow the operator discovering the
				effective value of MaxDigestsIn at runtime or from the system
				documentation.</t>
			</section>
			<section anchor="mdo" title="MaxDigestsOut">
				<t>MaxDigestsOut is an unsigned integer parameter conceptually purposed
				for limiting the amount of a sent authenticated packet's space spent on
				authentication data. The sending procedure adds at most MaxDigestsOut
				(<xref target="tx_procedure" /> item 5) HMAC results to a given packet,
				concurring with the output buffer management explained in
				<xref target="buffering" />.</t>
				<t>MaxDigestsOut value MUST be at least 2. An implementation SHOULD make
				MaxDigestsOut a per-interface parameter, but MAY make it specific to the
				whole protocol instance. An implementation SHOULD allow the operator
				changing the value of MaxDigestsOut at runtime or by means of Babel speaker
				restart, in a safe range. The maximum safe value of MaxDigestsOut is
				implementation-specific (see <xref target="buffering" />). An
				implementation MUST allow the operator discovering the effective value of
				MaxDigestsOut at runtime or from the system documentation.</t>
			</section>
			<section anchor="anm_table" title="ANM Table">
				<t>The ANM (Authentic Neighbours Memory) table resembles the neighbour
				table defined in Section 3.2.3 of <xref target="BABEL" />. Note that the
				term "neighbour table" means the neighbour table of the original Babel
				specification, and term "ANM table" means the table defined herein.
				Indexing of the ANM table is done in exactly the same way as indexing of
				the neighbour table, but purpose, field set and associated procedures are
				different.</t>
				<t>Conceptual purpose of the ANM table is to provide a longer term replay
				attack protection, than it would be possible using the neighbour table.
				Expiry of an inactive entry in the neighbour table depends on the last
				received Hello Interval of the neighbour and typically stands for tens to
				hundreds of seconds (see Appendix A and Appendix B of
				<xref target="BABEL" />). Expiry of an inactive entry in the ANM table
				depends only on the local speaker's configuration. The ANM table retains
				(for at least the amount of seconds set by ANM timeout parameter defined
				in <xref target="anm_timeout" />) a copy of TS/PC number advertised in
				authentic packets by each remote Babel speaker.</t>
				<t>The ANM table is indexed by pairs of the form (Interface, Source). Every
				table entry consists of the following fields:
				<list style="symbols">
					<t>Interface<vspace blankLines="1" />
					An implementation-specific reference to the local node's interface that
					the authentic packet was received through.</t>
					<t>Source<vspace blankLines="1" />
					IPv6 source address of the Babel speaker that the authentic packet was
					received from.</t>
					<t>LastTS<vspace blankLines="1" />
					A 32-bit unsigned integer, the TS part of a remote TS/PC number.</t>
					<t>LastPC<vspace blankLines="1" />
					A 16-bit unsigned integer, the PC part of a remote TS/PC number.</t>
				</list>
				Each ANM table entry has an associated aging timer, which is reset by the
				receiving procedure (<xref target="rx_procedure" /> item 9). If the timer
				expires, the entry is deleted from the ANM table.</t>
				<t>An implementation SHOULD use a persistent memory (NVRAM) to retain the
				contents of ANM table across restarts of the Babel speaker, but only as
				long as both the Interface field reference and expiry of the aging timer
				remain correct. An implementation MUST make it clear, if and how persistent
				memory is used for ANM table. An implementation SHOULD allow the operator
				retrieving the current contents of ANM table at runtime. An implementation
				SHOULD allow the operator removing some or all of ANM table entries at
				runtime or by means of Babel speaker restart.</t>
			</section>
			<section anchor="anm_timeout" title="ANM Timeout">
				<t>ANM timeout is an unsigned integer parameter. An implementation SHOULD
				make ANM timeout a per-interface parameter, but MAY make it specific to
				the whole protocol instance. ANM timeout is conceptually purposed for
				limiting the maximum age (in seconds) of entries in the ANM table standing
				for inactive Babel speakers. The maximum age is immediately related to
				replay attack protection strength. The strongest protection is achieved
				with the maximum possible value of ANM timeout set, but it may provide not
				the best overall result for specific network segments and implementations
				of this mechanism.</t>
				<t>In the first turn, implementations unable to maintain local TS/PC number
				strictly increasing across Babel speaker restarts will reuse advertised
				TS/PC numbers after each restart (see <xref target="tspcmgmt" />). The
				neighbouring speakers will treat the new packets as replayed and discard
				them until the aging timer of respective ANM table entry expires or the
				new TS/PC number exceeds the one stored in the entry.</t>
				<t>Another possible, but less probable case could be an environment
				involving physical moves of network interfaces hardware between routers.
				Even performed without restarting Babel speakers, these would cause random
				drops of the TS/PC number advertised for a given (Interface, Source) index,
				as viewed by neighbouring speakers, since IPv6 link-local addresses are
				typically derived from interface hardware addresses.</t>
				<t>Assuming, that in such cases the operators would prefer using a lower
				ANM timeout value to let the entries expire on their own rather than having
				to manually remove them from ANM table each time, an implementation SHOULD
				set the default value of ANM timeout to a value between 30 and 300 seconds.</t>
				<t>At the same time, network segments may exist with every Babel speaker
				having its advertised TS/PC number strictly increasing over the deployed
				lifetime. Assuming, that in such cases the operators would prefer using
				a much higher ANM timeout value, an implementation SHOULD allow the
				operator changing the value of ANM timeout at runtime or by means of Babel
				speaker restart. An implementation MUST allow the operator discovering the
				effective value of ANM timeout at runtime or from the system documentation.</t>
			</section>
			<section anchor="csa" title="Configured Security Associations">
				<t>A Configured Security Association (CSA) is a data structure conceptually
				purposed for associating authentication keys and hash algorithms with Babel
				interfaces. All CSAs are managed in finite sequences, one sequence per each
				interface ("interface's sequence of CSAs" hereafter). Each interface's
				sequence of CSAs, as an integral part of the Babel
				speaker configuration, MAY be intended for a persistent storage as long
				as this conforms with the implementation's key management policy.
				The default state of an interface's sequence of CSAs
				is empty, which has a special meaning of no authentication configured
				for the interface. The sending (<xref target="tx_procedure" /> item 1)
				and the receiving (<xref target="rx_procedure" /> item 1) procedures
				address this convention accordingly.</t>
				<t>A single CSA structure consists of the following fields:
				<list style="symbols">
					<t>HashAlgo<vspace blankLines="1" />
					An implementation-specific reference to one of the hash algorithms
					supported by this implementation (see <xref target="hashalgos" />).</t>
					<t>KeyChain<vspace blankLines="1" />
					A finite sequence of elements ("KeyChain sequence" hereafter)
					representing authentication keys, each element
					being a structure consisting of the following fields:
					<list style="symbols">
						<t>LocalKeyID<vspace blankLines="1" />
						An unsigned integer of an implementation-specific bit length.</t>
						<t>AuthKeyOctets<vspace blankLines="1" />
						A sequence of octets of an arbitrary, known length to be used as the
						authentication key.</t>
						<t>KeyStartAccept<vspace blankLines="1" />
						The time that this Babel speaker will begin considering this
						authentication key for accepting packets with authentication data.</t>
						<t>KeyStartGenerate<vspace blankLines="1" />
						The time that this Babel speaker will begin considering this
						authentication key for generating packet authentication data.</t>
						<t>KeyStopGenerate<vspace blankLines="1" />
						The time that this Babel speaker will stop considering this
						authentication key for generating packet authentication data.</t>
						<t>KeyStopAccept<vspace blankLines="1" />
						The time that this Babel speaker will stop considering this
						authentication key for accepting packets with authentication data.</t>
					</list></t>
				</list></t>
				<t>Since there is no limit imposed on number of CSAs per an interface, but
				number of HMAC computations per a sent/received packet is limited
				(through MaxDigestsOut and MaxDigestsIn respectively), only a fraction of
				the associated keys and hash algorithms may appear used in the process.
				Ordering of elements within a sequence of CSAs and within a KeyChain sequence is
				important to make association selection process deterministic and
				transparent. Once this ordering is deterministic at Babel interface level,
				the intermediate data derived by the procedure defined in
				<xref target="deriving" /> will be deterministically ordered as well.</t>
				<t>An implementation SHOULD allow an operator to set any arbitrary order
				of elements within a given interface's sequence of CSAs and within the KeyChain
				sequence of a given CSA. Regardless if this requirement is or isn't met, the
				implementation MUST provide a mean to discover the actual element order
				used. Whichever order is used by an implementation, it MUST be preserved
				across Babel speaker restarts.</t>
				<t>Note that none of the CSA structure fields is constrained to contain
				unique values. <xref target="sadup" /> explains this in more details.
				It is possible for the KeyChain sequence to be empty, although this is not
				the intended way of CSAs use.</t>
				<t>The KeyChain sequence has a direct prototype, which is the "key chain"
				syntax item of some existing router configuration languages. Whereas an
				implementation already implements this syntax item, it is suggested to
				reuse it, that is, to implement a CSA syntax item referring to a key
				chain item instead of reimplementing the latter in full.</t>
			</section>
			<section anchor="esa" title="Effective Security Associations">
				<t>An Effective Security Association (ESA) is a data structure immediately
				used in sending (<xref target="tx_procedure" />) and receiving
				(<xref target="rx_procedure" />) procedures. Its conceptual purpose is to
				determine a runtime interface between those procedures and the deriving
				procedure defined in <xref target="deriving" />. All ESAs are temporary
				data units managed as elements of finite sequences that are not intended
				for a persistent storage. Element ordering within each such finite sequence
				("sequence of ESAs" hereafter) MUST be preserved as long as the sequence
				exists.</t>
				<t>A single ESA structure consists of the following fields:
				<list style="symbols">
					<t>HashAlgo<vspace blankLines="1" />
					An implementation-specific reference to one of the hash algorithms
					supported by this implementation (see <xref target="hashalgos" />).</t>
					<t>KeyID<vspace blankLines="1" />
					A 16-bit unsigned integer.</t>
					<t>AuthKeyOctets<vspace blankLines="1" />
					A sequence of octets of an arbitrary, known length to be used as the
					authentication key.</t>
				</list></t>
				<t>Note that among the protocol data structures introduced by this
				mechanism ESA is the only one not directly interfaced with the system
				operator (see <xref target="dataflows" />), it is not immediately
				present in the protocol encoding either. However, ESA is not just a
				possible implementation technique, but an integral part of this
				specification: the deriving (<xref target="deriving" />), the sending
				(<xref target="tx_procedure" />), and the receiving
				(<xref target="rx_procedure" />) procedures are defined in terms of the
				ESA structure and its semantics provided herein. ESA is as meaningful for
				a correct implementation as the other protocol data structures.</t>
			</section>
		</section>

		<section title="Updates to Protocol Encoding">
			<section title="Justification">
				<t>Choice of encoding is very important in the long term. Protocol encoding
				defines possible options of authentication mechanism design and encoding,
				which in turn define options of future developments of the protocol.</t>
				<t>Considering existing implementations of Babel protocol instance itself
				and related modules of packet analysers, current encoding of Babel allows
				for compact and robust decoders. At the same time, this encoding allows
				for future extensions of Babel by three (not excluding each other)
				principal means defined by Section 4.2 and Section 4.3 of
				<xref target="BABEL" />:
				<list style="letters">
					<t>A Babel packet consists of a four-octet header followed by a packet
					body, that is, a sequence of TLVs (see
					<xref target="datagram_structure" />). Besides the header and the
					body, an actual Babel datagram may have an arbitrary amount of
					trailing data between the end of the packet body and the end of the
					datagram. An instance of the original protocol silently ignores such
					trailing data.</t>
					<t>The packet body employs a binary format allowing for 256 TLV types
					and imposing no requirements on TLV ordering or number of TLVs of a given
					type in a packet. Only TLV length matters within the packet body, TLV body
					contents is to be interpreted elsewhere. This makes an iteration over
					the sequence of TLVs possible without a knowledge of body structure of each TLV
					(with the only distinction between a Pad1 TLV and any other TLVs). The
					original specification allocates TLV types 0 through 10 (see
					<xref target="tlv_namespace" />) and defines TLV
					body structure for each. An instance of the original protocol silently
					ignores any unknown TLV types.</t>
					<t>Within each TLV of the packet body there may be some "extra data" after
					the "expected length" of the TLV body. An instance of the original
					protocol silently ignores any such extra data. Note that any TLV types
					without the expected length defined (such as PadN TLV) cannot be extended
					with the extra data.</t>
				</list></t>
				<t>Considering each principal extension mean for the specific purpose of
				adding authentication data items to each protocol packet, the following
				arguments can be made:
				<list style="symbols">
					<t>Use of the TLV extra data of some existing TLV type would not be a
					solution, since no particular TLV type is guaranteed to be present in
					a Babel packet.</t>
					<t>Use of the TLV extra data could also conflict with future developments
					of the protocol encoding.</t>
					<t>Since the packet trailing data is currently unstructured, using it
					would involve defining an encoding structure and associated procedures,
					adding to the complexity of both specification and implementation and
					increasing the exposure to protocol attacks such as fuzzing.</t>
					<t>A naive use of the packet trailing data would make it unavailable to
					any future extension of Babel. Since this mechanism is possibly not the
					last extension and since some other extensions may allow no other
					embedding means except the packet trailing data, the defined encoding
					structure would have to enable multiplexing of data items belonging to
					different extensions. Such a definition is out of scope of this work.</t>
					<t>Deprecating an extension (or only its protocol encoding) that uses
					purely purpose-allocated TLVs is as simple as deprecating the TLVs.</t>
					<t>Use of purpose-allocated TLVs is transparent to both the original
					protocol and any its future extensions, regardless of the embedding
					mean(s) used by the latter.</t>
				</list></t>
				<t>Considering all of the above, this mechanism neither uses the packet
				trailing data nor uses the TLV extra data, but uses two new TLV types:
				type 11 for a TS/PC number and type 12 for a HMAC result (see
				<xref target="tlv_namespace" />).</t>
			</section>
			<section title="TS/PC TLV">
				<figure>
					<preamble>The purpose of a TS/PC TLV is to store a single TS/PC number.
					There is normally exactly one TS/PC TLV in an authenticated Babel packet.
					Any occurences of this TLV except the first are ignored.</preamble>
					<artwork align="left">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type = 11  |     Length    |         PacketCounter         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Timestamp                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
					</artwork>
				</figure>
				<t>Fields:
				<list style="hanging" hangIndent="16">
					<t hangText="Type">Set to 11 to indicate a TS/PC TLV.</t>
					<t hangText="Length">The length of the body, exclusive of the Type and
					Length fields.</t>
					<t hangText="PacketCounter">A 16-bit unsigned integer in network byte
					order, the PC part of a TS/PC number stored in this TLV.</t>
					<t hangText="Timestamp">A 32-bit unsigned integer in network byte
					order, the TS part of a TS/PC number stored in this TLV.</t>
				</list>
				Note that ordering of PacketCounter and Timestamp in TLV structure is
				opposite to the ordering of TS and PC in "TS/PC" term and the 48&nbhy;bit
				equivalent (see <xref target="cryptoseqno" />).</t>
				<t>Considering the "expected length" and the "extra data" in the definition
				of Section 4.2 of <xref target="BABEL" />, the expected length of a TS/PC
				TLV body is unambiguously defined as 6 octets. The receiving procedure
				correctly processes any TS/PC TLV with body length not less than the
				expected, ignoring any extra data (<xref target="rx_procedure" /> items
				3 and 9). The sending procedure produces a TS/PC TLV with body length equal
				to the expected and Length field set respectively
				(<xref target="tx_procedure" /> item 3).</t>
				<t>Future Babel extensions (such as sub-TLVs) MAY modify the sending
				procedure to include the extra data after the fixed-size TS/PC TLV body
				defined herein, making necessary adjustments to Length TLV field, "Body
				length" packet header field and output buffer management explained in
				<xref target="buffering" />.</t>
			</section>
			<section anchor="hmac_tlv" title="HMAC TLV">
				<figure>
					<preamble>The purpose of a HMAC TLV is to store a single HMAC result.
					To assist a receiver in reproducing the HMAC computation, LocalKeyID
					modulo 2^16 of the authentication key is also provided in the TLV. There
					is normally at least one HMAC TLV in an authenticated Babel packet.
					</preamble>
					<artwork align="left">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type = 12  |    Length     |             KeyID             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Digest...
+-+-+-+-+-+-+-+-+-+-+-+-
					</artwork>
				</figure>
				<t>Fields:
				<list style="hanging" hangIndent="16">
					<t hangText="Type">Set to 12 to indicate a HMAC TLV.</t>
					<t hangText="Length">The length of the body, exclusive of the Type and
					Length fields.</t>
					<t hangText="KeyID">A 16-bit unsigned integer in network byte order.</t>
					<t hangText="Digest">A variable-length sequence of octets that MUST be
					at least 16 octets long.</t>
				</list></t>
				<t>Considering the "expected length" and the "extra data" in the definition
				of Section 4.2 of <xref target="BABEL" />, the expected length of a HMAC
				TLV body is not defined. The receiving procedure processes every octet of
				the Digest field, deriving the field boundary from the Length field value
				(<xref target="rx_procedure" /> item 6). The sending procedure produces
				HMAC TLVs with Length field precisely sizing the Digest field to match
				digest length of the hash algorithm used (<xref target="tx_procedure" />
				items 5 and 8).</t>
				<t>HMAC TLV structure defined herein is final, future Babel extensions MUST
				NOT extend it with any extra data.</t>
			</section>
		</section>

		<section title="Updates to Protocol Operation">
			<section anchor="tspcmgmt" title="Per-Interface TS/PC Number Updates">
				<t>LocalTS and LocalPC interface-specific variables constitute the TS/PC
				number of a Babel interface. This number is advertised in the TS/PC TLV
				of authenticated Babel packets sent from that interface. There is only one
				property mandatory for the advertised TS/PC number: its 48&nbhy;bit equivalent
				(see <xref target="cryptoseqno" />)
				MUST be strictly increasing within the scope of a given interface of a
				Babel speaker as long as the protocol instance is continuously operating. This
				property combined with ANM tables of neighbouring Babel speakers provides
				them with the most basic replay attack protection.</t>
				<t>Initialization and increment are two principal updates performed on an
				interface TS/PC number. The initialization is performed when a new
				interface becomes a part of a Babel protocol instance. The increment is
				performed by the sending procedure (<xref target="tx_procedure" /> item
				2) before advertising the TS/PC number in a TS/PC TLV.</t>
				<t>Depending on particular implementation method of these two updates the
				advertised TS/PC number may possess additional properties improving the
				replay attack protection strength. This includes, but is not limited to
				the methods below.
				<list style="letters">
					<t>The most straightforward implementation would use LocalTS as a plain
					wrap counter, defining the updates as follows:
					<list style="hanging" hangIndent="16">
						<t hangText="initialization">Set LocalPC to 0, set LocalTS to 0.</t>
						<t hangText="increment">Increment LocalPC by 1. If LocalPC wraps
						(0xFFFF + 1 = 0x0000), increment LocalTS by 1.</t>
					</list>
					In this case advertised TS/PC numbers would be reused after each Babel
					protocol instance restart, making neighbouring speakers reject authenticated
					packets until respective ANM table entries expire or the new TS/PC number
					exceeds the old (see <xref target="anm_table" /> and
					<xref target="anm_timeout" />).</t>
					<t>A more advanced implementation could make a use of any 32&nbhy;bit unsigned
					integer timestamp (number of time units since an arbitrary epoch) such
					as the UNIX timestamp, whereas the timestamp itself spans a reasonable
					time range and is guaranteed against a decrease (such as one resulting
					from network time use). The updates would be defined as follows:
					<list style="hanging" hangIndent="16">
						<t hangText="initialization">Set LocalPC to 0, set LocalTS to 0.</t>
						<t hangText="increment">If the current timestamp is greater than
						LocalTS, set LocalTS to the current timestamp and LocalPC to 0, then
						consider the update complete. Otherwise increment LocalPC by 1 and,
						if LocalPC wraps, increment LocalTS by 1.</t>
					</list>
					In this case the advertised TS/PC number would remain unique across
					speaker's deployed lifetime without the need for any persistent storage.
					However, a suitable timestamp source is not available in every
					implementation case.</t>
					<t>Another advanced implementation could use LocalTS in a way similar
					to the "wrap/boot counter" suggested in Section 4.1.1 of
					<xref target="OSPF3-AUTH" />, defining the updates as follows:
					<list style="hanging" hangIndent="16">
						<t hangText="initialization">Set LocalPC to 0. Whether there is a TS
						value stored in NVRAM for the current interface, set LocalTS to the stored
						TS value, then increment the stored TS value by 1. Otherwise set
						LocalTS to 0 and set the stored TS value to 1.</t>
						<t hangText="increment">Increment LocalPC by 1. If LocalPC wraps, set
						LocalTS to the TS value stored in NVRAM for the current interface, then
						increment the stored TS value by 1.</t>
					</list>
					In this case the advertised TS/PC number would also remain unique across
					speaker's deployed lifetime, relying on NVRAM for storing multiple TS
					numbers, one per each interface.</t>
				</list></t>
				<t>As long as the TS/PC number retains its mandatory property stated above,
				it is up to the implementer, which TS/PC number updates methods are
				available and if the operator can configure the method per-interface
				and/or at runtime. However, an implementation MUST disclose the essence
				of each updates method it includes, in a comprehensible form such as
				natural language description, pseudocode, or source code. An implementation
				MUST allow the operator discovering, which updates method is effective for
				any given interface, either at runtime or from the system documentation.
				These requirements are necessary to enable the optimal (see
				<xref target="anm_timeout" />) management of ANM timeout in a network
				segment.</t>
				<t>Note that wrapping (0xFFFFFFFF + 1 = 0x00000000) of LastTS is unlikely,
				but possible, causing the advertised TS/PC number to be reused. Resolving
				this situation requires replacing of all authentication keys of the
				involved interface. In addition to that, if the wrap was caused by a
				timestamp reaching its end of epoch, using this mechanism will be
				impossible for the involved interface until some different timestamp or
				update implementation method is used.</t>
			</section>
			<section anchor="deriving" title="Deriving ESAs from CSAs">
				<t>Neither receiving nor sending procedures work with the contents of
				interface's sequence of CSAs directly, both (<xref target="rx_procedure" />
				item 4 and <xref target="tx_procedure" /> item 4 respectively) derive a
				sequence of ESAs from the sequence of CSAs and use the derived sequence (see
				<xref target="dataflows" />). There are two
				main goals achieved through this indirection:
				<list style="symbols">
					<t>Elimination of expired authentication keys and deduplication of
					security associations. This is done
					earliest possible to keep subsequent procedures focused on their
					respective tasks.</t>
					<t>Maintenance of particular ordering within the derived sequence of ESAs. The
					ordering deterministically depends on the ordering within interface's
					sequence of CSAs and ordering within KeyChain sequence of each CSA. Particular
					correlation maintained by this procedure implements a concept of fair
					(independent of number of keys contained by each) competition between
					CSAs.</t>
				</list>
				The deriving procedure uses the following input arguments:
				<list style="symbols">
					<t>input sequence of CSAs</t>
					<t>direction (sending or receiving)</t>
					<t>current time (CT)</t>
				</list>
				Processing of input arguments begins with an empty output sequence of
				ESAs and consists of the following steps:
				<list style="numbers">
					<t>Make a temporary copy of the input sequence of CSAs.</t>
					<t>Remove all expired authentication keys from each KeyChain sequence of the
					copy, that is, any keys such that:
					<list style="symbols">
						<t>for receiving: KeyStartAccept is greater than CT or KeyStopAccept
						is less than CT</t>
						<t>for sending: KeyStartGenerate is greater than CT or KeyStopGenerate
						is less than CT</t>
					</list>
					Note well that there are no special exceptions. Remove all expired keys,
					even if there are no keys left after that (see
					<xref target="exhaustion" />).</t>
					<t>Use the copy to populate the output sequence of ESAs as follows:
					<list style="numbers">
						<t>Whether the KeyChain sequence of the first CSA contains at least one
						key, use its first key to produce an ESA with fields set as follows:
						<list style="hanging" hangIndent="15">
							<t hangText="HashAlgo">Set to HashAlgo of the current CSA.</t>
							<t hangText="KeyID">Set to LocalKeyID modulo 2^16 of the current key
							of the current CSA.</t>
							<t hangText="AuthKeyOctets">Set to AuthKeyOctets of the current key
							of the current CSA.</t>
						</list>
						Append this ESA to the end of the output sequence.</t>
						<t>Whether the KeyChain sequence of the second CSA contains at least one
						key, use its first key the same way and so forth until all first keys
						of the copy are processed.</t>
						<t>Whether the KeyChain sequence of the first CSA contains at least two
						keys, use its second key the same way.</t>
						<t>Whether the KeyChain sequence of the second CSA contains at least two
						keys, use its second key the same way and so forth until all second
						keys of the copy are processed.</t>
						<t>And so forth until all keys of all CSAs of the copy are processed,
						exactly one time each.</t>
					</list>
					In the description above the ordinals ("first", "second", and so on)
					with regard to keys stand for an element position after the removal of
					expired keys, not before. For example, if a KeyChain sequence was
					{ Ka, Kb, Kc, Kd } before the removal and became { Ka, Kd }
					after, then Ka would be the "first" element and Kd would be the
					"second".</t>
					<t>Deduplicate the ESAs in the output sequence, that is, wherever two
					or more ESAs exist that share the same (HashAlgo, KeyID, AuthKeyOctets)
					triplet value, remove all of these ESAs except the one
					closest to the beginning of the sequence.</t>
				</list>
				The resulting sequence will contain zero or more unique ESAs, ordered in a way
				deterministically correlated with ordering of CSAs within the original
				input sequence of CSAs and ordering of keys within each KeyChain sequence. This
				ordering maximizes the probability of having equal amount of keys per
				original CSA in any N first elements of the resulting sequence. Possible
				optimizations of this deriving procedure are outlined in
				<xref target="derivingopts" />.</t>
			</section>
			<section anchor="tx_procedure" title="Updates to Packet Sending">
				<t>Perform the following authentication-specific processing after the
				instance of the original protocol considers an outgoing Babel packet ready
				for sending, but before the packet is actually sent (see
				<xref target="dataflows" />). After that send the packet regardless if the
				authentication-specific processing modified the outgoing packet or left
				it intact.
				<list style="numbers">
					<t>If the current outgoing interface's sequence of CSAs is empty, finish
					authentication-specific processing and consider the packet ready for
					sending.</t>
					<t>Increment TS/PC number of the current outgoing interface as explained
					in <xref target="tspcmgmt" />.</t>
					<t>Append to the end of the packet body (see
					<xref target="datagram_structure" />) a TS/PC TLV with fields set as follows:
					<list style="hanging" hangIndent="16">
						<t hangText="Type">Set to 11.</t>
						<t hangText="Length">Set to 6.</t>
						<t hangText="PacketCounter">Set to the current value of LocalPC
						variable of the current outgoing interface.</t>
						<t hangText="Timestamp">Set to the current value of LocalTS variable
						of the current outgoing interface.</t>
					</list>
					Note that the current step may involve byte order conversion.</t>
					<t>Derive a sequence of ESAs using procedure defined in
					<xref target="deriving" /> with the current interface's sequence of CSAs
					as the input sequence of CSAs, current time as CT and "sending" as the
					direction. Proceed to the next step even if the derived sequence
					is empty.</t>
					<t>Iterate over the derived sequence using its ordering. For each ESA
					append to the end of the packet body (see
					<xref target="datagram_structure" />) a HMAC TLV with fields set as follows:
					<list style="hanging" hangIndent="9">
						<t hangText="Type">Set to 12.</t>
						<t hangText="Length">Set to 2 plus digest length of HashAlgo of the
						current ESA.</t>
						<t hangText="KeyID">Set to KeyID of the current ESA.</t>
						<t hangText="Digest">Size exactly to the digest length of HashAlgo of
						the current ESA. Set the first 16 octets to the source IPv6 address
						of the current packet (see <xref target="srcaddr" />) and any
						subsequent octets to 0x00 (see <xref target="padded_digest" />).</t>
					</list>
					As soon as there are MaxDigestsOut HMAC TLVs appended to the current
					packet body, immediately proceed to the next step.<vspace blankLines="1" />
					Note that the current step may involve byte order conversion.</t>
					<t>Increment "Body length" field value of the current packet header by the
					total length of TS/PC and HMAC TLVs appended to the current packet body so
					far.<vspace blankLines="1" />
					Note that the current step may involve byte order conversion.</t>
					<t>Make a temporary copy of the current packet.</t>
					<t>Iterate over the derived sequence again, using the same very order and
					amount of elements. For each ESA (and respectively for each HMAC TLV
					recently appended to the current packet body) compute a HMAC result (see
					<xref target="hmac" />) using the temporary copy (not the original
					packet) as Text, HashAlgo of the current ESA as H, and AuthKeyOctets of
					the current ESA as K. Write the HMAC result to the Digest field of the
					current HMAC TLV (see <xref target="filled_digest" />) of the current
					packet (not the copy).</t>
					<t>Since this point, allow no more changes to the current packet header and body and
					consider it ready for sending.</t>
				</list></t>
				<t>Note that even when the derived sequence of ESAs is empty, the packet is sent
				anyway with only a TS/PC TLV appended to its body. Although
				such a packet would not be authenticated, presence of the sole TS/PC TLV would indicate
				authentication keys exhaustion to operators of neighbouring Babel speakers.
				See also <xref target="exhaustion" />.</t>
			</section>
			<section anchor="rx_procedure" title="Updates to Packet Receiving">
				<t>Perform the following authentication-specific processing after an
				incoming Babel packet is received from local IPv6 stack, but before it is
				processed by the Babel protocol instance (see <xref target="dataflows" />).
				The final action conceptually depends not only upon the result of the
				authentication-specific processing, but also on the current value of
				RxAuthRequired parameter. Immediately after any processing step below
				accepts or refuses the packet, either deliver the packet to the instance
				of the original protocol (when the packet is accepted or RxAuthRequired
				is FALSE) or discard it (when the packet is refused and RxAuthRequired is
				TRUE).
				<list style="numbers">
					<t>If the current incoming interface's sequence of CSAs is empty, accept the
					packet.</t>
					<t>If the current packet does not contain a TS/PC TLV, refuse it.</t>
					<t>Perform a lookup in the ANM table for an entry having Interface
					equal to the current incoming interface and Source equal to the source
					address of the current packet. If such an entry does not exist,
					immediately proceed to the next step. Otherwise, compare the entry's
					LastTS and LastPC field values with Timestamp and PacketCounter values
					respectively of the first TS/PC TLV of the packet. That is, refuse the
					packet, if at least one of the following two conditions is true:
					<list style="symbols">
						<t>Timestamp is less than LastTS</t>
						<t>Timestamp is equal to LastTS and PacketCounter is not greater than
						LastPC</t>
					</list>
					Note that the current step may involve byte order conversion.</t>
					<t>Derive a sequence of ESAs using procedure defined in
					<xref target="deriving" /> with the current interface's sequence of CSAs
					as the input sequence of CSAs, current time as CT and "receiving" as the
					direction. If the derived sequence is empty, refuse the packet.</t>
					<t>Make a temporary copy of the current packet.</t>
					<t>For every HMAC TLV present in the temporary copy (not the original
					packet) pad all octets of its Digest field using the source IPv6 address
					of the current packet to set the first 16 octets and 0x00 to set any
					subsequent octets (see <xref target="padded_digest" />).</t>
					<t>Iterate over all HMAC TLVs  of the original input packet (not the
					copy) using their order of appearance in the packet. For each HMAC TLV
					look up all ESAs in the derived sequence such that 2 plus digest length of
					HashAlgo of the ESA is equal to Length of the TLV and KeyID of the ESA
					is equal to value of KeyID of the TLV. Iterate over these ESAs in the
					relative order of their appearance on the full sequence of ESAs. Note that nesting
					the iterations the opposite way (over ESAs, then over HMAC TLVs) would be
					wrong.
					<vspace blankLines="1" />
					For each of these ESAs compute a HMAC result (see <xref target="hmac" />)
					using the temporary copy (not the original packet) as Text, HashAlgo of
					the current ESA as H, and AuthKeyOctets of the current ESA as K. If the
					current HMAC result exactly matches the contents of Digest field of the
					current HMAC TLV, immediately proceed to the next step. Otherwise, if
					number of HMAC computations done for the current packet so far is equal to
					MaxDigestsIn, immediately proceed to the next step. Otherwise follow the
					normal order of iterations.<vspace blankLines="1" />
					Note that the current step may involve byte order conversion.</t>
					<t>Refuse the input packet unless there was a matching HMAC result in
					the previous step.</t>
					<t>Modify the ANM table, using the same index as for the entry lookup
					above, to contain an entry with LastTS set to the value of Timestamp and
					LastPC set to the value of PacketCounter fields of the first TS/PC TLV
					of the current packet. That is, either add a new ANM table entry or
					update the existing one, depending on the result of the entry lookup
					above. Reset the entry's aging timer to the current value of ANM
					timeout.<vspace blankLines="1" />
					Note that the current step may involve byte order conversion.</t>
					<t>Accept the input packet.</t>
				</list>
				Note that RxAuthRequired affects only the final action, but not the
				defined flow of authentication-specific processing. The purpose of this
				is to preserve authentication-specific processing feedback (such as log
				messages and event counters updates) even with RxAuthRequired set to FALSE.
				This allows an operator to predict the effect of changing RxAuthRequired
				from FALSE to TRUE during a migration scenario (<xref target="migration" />)
				implementation.</t>
			</section>
			<section anchor="stats" title="Authentication-Specific Statistics Maintenance">
				<t>A Babel speaker implementing this mechanism SHOULD maintain a set of
				counters for the following events, per protocol instance and per each
				interface:
				<list style="symbols">
					<t>Sending of an unauthenticated Babel packet through an interface having
					an empty sequence of CSAs (<xref target="tx_procedure" /> item 1).</t>
					<t>Sending of an unauthenticated Babel packet with a TS/PC TLV but
					without any HMAC TLVs due to an empty derived sequence of ESAs
					(<xref target="tx_procedure" /> item 4).</t>
					<t>Sending of an authenticated Babel packet containing both TS/PC and
					HMAC TLVs (<xref target="tx_procedure" /> item 9).</t>
					<t>Accepting of a Babel packet received through an interface having an
					empty sequence of CSAs (<xref target="rx_procedure" /> item 1).</t>
					<t>Refusing of a received Babel packet due to an empty derived sequence
					of ESAs (<xref target="rx_procedure" /> item 4).</t>
					<t>Refusing of a received Babel packet missing any TS/PC TLVs
					(<xref target="rx_procedure" /> item 2).</t>
					<t>Refusing of a received Babel packet due to the first TS/PC TLV
					failing the ANM table check (<xref target="rx_procedure" /> item 3).</t>
					<t>Refusing of a received Babel packet missing any HMAC TLVs
					 (<xref target="rx_procedure" /> item 8).</t>
					<t>Refusing of a received Babel packet due to none of the processed
					HMAC TLVs passing the ESA check (<xref target="rx_procedure" /> item 8).</t>
					<t>Accepting of a received Babel packet having both TS/PC and HMAC TLVs
					(<xref target="rx_procedure" /> item 10).</t>
					<t>Delivery of a refused packet to the instance of the original
					protocol due to RxAuthRequired parameter set to FALSE.</t>
				</list>
				Note that terms "accepting" and "refusing" are used in the sense of the
				receiving procedure, that is, "accepting" does not mean a packet delivered
				to the instance of the original protocol purely because of RxAuthRequired
				parameter set to FALSE. Event counters readings SHOULD be available to the
				operator at runtime.</t>
			</section>
		</section>

		<section title="Implementation Notes">
			<section anchor="srcaddr" title="IPv6 Source Address Selection for Sending">
				<t>Section 3.1 of <xref target="BABEL" /> defines that Babel datagrams
				are exchanged using IPv6 link-local address as source address. This implies
				having at least one such address assigned to an interface participating
				in the exchange. When the interface has more than one link-local addresses
				assigned, selection of one particular link-local address as packet source
				address is left up to the local IPv6 stack, since this choice is not
				meaningful in the scope of the original protocol. However, the sending
				procedure requires exact knowledge of packet source address for proper
				padding (<xref target="tx_procedure" /> item 5) of HMAC TLVs.</t>
				<t>As long as a Babel interface has more than one IPv6 link-local addresses
				assigned, the Babel speaker SHOULD internally choose one particular
				link-local address for Babel packet sending purposes and make this choice
				to both the sending procedure and local IPv6 stack (see
				<xref target="dataflows" />). Wherever this requirement cannot be met,
				this limitation MUST be clearly stated in the system documentation to allow
				an operator to plan IPv6 address management accordingly.</t>
			</section>
			<section anchor="buffering" title="Output Buffer Management">
				<t>An instance of the original protocol buffers produced TLVs until the
				buffer becomes full or a delay timer has expired or an urgent TLV is
				produced. This is performed independently for each Babel interface with
				each buffer sized according to the interface MTU (see Sections 3.1 and 4
				of <xref target="BABEL" />).</t>
				<t>Since TS/PC and HMAC TLVs and any other TLVs, in the first place those
				of the original protocol, share the same packet space (see
				<xref target="datagram_structure" />) and respectively the same buffer
				space, a particular portion of each interface buffer needs to be reserved
				for 1 TS/PC TLV and up to MaxDigestsOut HMAC TLVs. Amount (R) of this
				reserved buffer space is calculated as follows:</t>
				<figure>
					<artwork align="center">
R = St + MaxDigestsOut * Sh =
  = 8  + MaxDigestsOut * (4 + Lmax)
					</artwork>
				</figure>
				<t><list style="hanging" hangIndent="8">
					<t hangText="St">Is the size of a TS/PC TLV.</t>
					<t hangText="Sh">Is the size of a HMAC TLV.</t>
					<t hangText="Lmax">Is the maximum digest length in octets possible for
					a particular interface. It SHOULD be calculated based on particular
					interface's sequence of CSAs, but MAY be taken as the maximum digest length
					supported by particular implementation.</t>
				</list></t>
				<t>An implementation allowing for per-interface value of MaxDigestsOut
				parameter has to account for different value of R across different
				interfaces, even having the same MTU. An implementation allowing for
				runtime change of MaxDigestsOut parameter value has to take care of the
				TLVs already buffered by the time of the change, especially when the change
				increases the value of R.</t>
				<t>The maximum safe value of MaxDigestsOut parameter depends on
				interface MTU and maximum digest length used. In general, at least 200-300
				octets of a Babel packet should be always available to data other than
				TS/PC and HMAC TLVs. An implementation following the requirements of
				Section 4 of <xref target="BABEL" /> would send packets sized 512 octets
				or larger. If, for example, the maximum digest length is 64 octets and
				MaxDigestsOut value is 4, the value of R would be 280, leaving less than
				a half of a 512-octet packet for any other TLVs. As long as interface MTU
				is larger or digest length is smaller, higher values of MaxDigestsOut can
				be used safely.</t>
			</section>
			<section anchor="derivingopts" title="Optimizations of ESAs Deriving">
				<t>The following optimizations of the ESAs deriving procedure can reduce
				amount of CPU time consumed by authentication-specific processing,
				preserving implementation's effective behaviour.
				<list style="letters">
					<t>The most straightforward implementation would treat the deriving
					procedure as a per-packet action. But since the procedure is
					deterministic (its output depends on its input only), it is possible to
					significantly reduce the number of times the procedure is performed.
					<vspace blankLines="1" />
					The procedure would obviously return the same result for the same input
					arguments (sequence of CSAs, direction, CT) values. However, it is possible
					to predict, when the result will remain the same even for a different
					input. That is, when the input sequence of CSAs and the direction both remain
					the same but CT changes, the result will remain the same as long as CT's
					order on the time axis (relative to all critical points of the sequence of
					CSAs) remains unchanged. Here, the critical points are KeyStartAccept
					and KeyStopAccept (for the "receiving" direction) and KeyStartGenerate
					and KeyStopGenerate (for the "sending" direction) of all keys of all
					CSAs of the input sequence. In other words, in this case the result will
					remain the same as long as both none of the active keys expire and none
					of the inactive keys enter into operation.<vspace blankLines="1" />
					An implementation optimized this way would perform the full deriving
					procedure for a given (interface, direction) pair only after an
					operator's change to the interface's sequence of CSAs or after reaching one
					of the critical points mentioned above.</t>
					<t>Considering, that the sending procedure iterates over at most
					MaxDigestsOut elements of the derived sequence of ESAs
					(<xref target="tx_procedure" /> item 5), there would be little sense in
					the case of "sending" direction in returning more than MaxDigestsOut
					unique ESAs in the derived sequence.
					Note that a similar optimization is impossible in the case of
					"receiving" direction, since number of ESAs actually used in examining
					a particular packet cannot be determined in advance.</t>
				</list></t>
			</section>
			<section anchor="sadup" title="Security Associations Duplication">
				<t>This specification defines three data structures as finite sequences:
				a KeyChain sequence, an interface's sequence of CSAs, and a sequence of
				ESAs. There are associated semantics to take into account during
				implementation, in that the same element can appear multiple times at
				different positions of the sequence. In particular, none of CSA structure
				fields (including HashAlgo, LocalKeyID, and AuthKeyOctets) alone or in a
				combination has to be unique within a given CSA, or within a given sequence
				of CSAs, or within all sequences of CSAs of a Babel speaker.</t>
				<t>In the CSA space defined this way, for any two authentication keys their
				one field (in)equality would not imply their another field (in)equality.
				In other words, it is acceptable to have more than one authentication key
				with the same LocalKeyID or the same AuthKeyOctets or both at a time. It
				is a conscious design decision, that CSA semantics allow for duplication
				of security associations. Consequently, ESA semantics allows for
				duplication of intermediate ESAs in the sequence until the explicit
				deduplication (<xref target="deriving" /> item 4).</t>
				<t>One of the intents of this is to define the security association
				management in a way to account for some specifics of Babel as a mesh
				routing protocol. For example, a system operator configuring a Babel
				speaker to participate in more than one administrative domain could find
				each domain using its own authentication key (AuthKeyOctets) under the same
				LocalKeyID value, e.g., a "well-known" or "default" value like 0 or 1. Since
				reconfiguring the domains to use distinct LocalKeyID values isn't always
				feasible, the multi-domain Babel speaker using several distinct
				authentication keys under the same LocalKeyID would make a valid use case
				for such duplication.</t>
				<t>Furthermore, if in this situation the operator decided to migrate one
				of the domains to a different LocalKeyID value in a seamless way, respective
				Babel speakers would use the same authentication key (AuthKeyOctets) under
				two different LocalKeyID values for the time of the transition (see also
				item (e) of <xref target="security" />). This would make a similar use
				case.</t>
				<t>Another intent of this design decision is to decouple security
				association management from authentication key management as much as
				possible, so that the latter, be it manual keying or a key management
				protocol, could be designed and implemented independently. This way the
				additional key management constraints, if any, would be left out of scope
				of this authentication mechanism. A similar thinking justifies LocalKeyID
				field having bit length in ESA structure definition, but not in that of
				CSA.</t>
			</section>
		</section>

		<section title="Network Management Aspects">
			<section title="Backward Compatibility">
				<t>Support of this mechanism is optional, it does not change the default
				behaviour of a Babel speaker and causes no compatibility issues with
				speakers properly implementing the original Babel specification. Given two
				Babel speakers, one implementing this mechanism and configured for
				authenticated exchange (A) and another not implementing it (B), these
				would not distribute routing information uni-directionally or form a
				routing loop or experience other protocol logic issues specific purely to
				the use of this mechanism.</t>
				<t>Babel design requires a bi-directional neighbour reachability condition
				between two given speakers for a successful exchange of routing information.
				Apparently, in the case above neighbour reachability would be
				uni-directional. Presence of TS/PC and HMAC TLVs in Babel packets sent by
				A would be transparent to B. But lack of authentication data in Babel
				packets send by B would make them effectively invisible to the instance
				of the original protocol of A. Uni-directional links are not specific to
				use of this mechanism, they naturally exist on their own and are properly
				detected and coped with by the original protocol (see Section 3.4.2 of
				<xref target="BABEL" />).</t>
			</section>
			<section title="Multi-Domain Authentication">
				<t>The receiving procedure treats a packet as authentic as soon as one of
				its HMAC TLVs passes the check against the derived sequence of ESAs. This allows for
				packet exchange authenticated with multiple (hash algorithm, authentication
				key) pairs simultaneously, in combinations as arbitrary as permitted by
				MaxDigestsIn and MaxDigestsOut.</t>
				<t>For example, consider three Babel speakers with one interface each,
				configured with the following CSAs:
				<list style="symbols">
					<t>speaker A: (hash algorithm H1; key SK1), (hash algorithm H1; key SK2)</t>
					<t>speaker B: (hash algorithm H1; key SK1)</t>
					<t>speaker C: (hash algorithm H1; key SK2)</t>
				</list>
				Packets sent by A would contain 2 HMAC TLVs each, packets sent by B and
				C would contain 1 HMAC TLV each. A and B would authenticate the exchange
				between themselves using H1 and SK1; A and C would use H1 and SK2; B and
				C would discard each other's packets.</t>
				<t>Consider a similar set of speakers configured with different CSAs:
				<list style="symbols">
					<t>speaker D: (hash algorithm H2; key SK3), (hash algorithm H3; key SK4)</t>
					<t>speaker E: (hash algorithm H2; key SK3), (hash algorithm H4, keys SK5
					and SK6)</t>
					<t>speaker F: (hash algorithm H3; keys SK4 and SK7), (hash algorithm H5,
					key SK8)</t>
				</list>
				Packets sent by D would contain 2 HMAC TLVs each, packets sent by E and
				F would contain 3 HMAC TLVs each. D and E would authenticate the exchange
				between themselves using H2 and SK3; D and F would use H3 and SK4; E and
				F would discard each other's packets. The simultaneous use of H4, SK5, and
				SK6 by E, as well as use of SK7, H5, and SK8 by F (for their own purposes) would
				remain insignificant to A.</t>
				<t>An operator implementing a multi-domain authentication should keep in
				mind that values of MaxDigestsIn and MaxDigestsOut may be different both
				within the same Babel speaker and across different speakers. Since the
				minimum value of both parameters is 2 (see <xref target="mdi" /> and
				<xref target="mdo" />), when more than 2 authentication domains are
				configured simultaneously, it is advised to confirm that every involved
				speaker can handle sufficient number of HMAC results for both sending and
				receiving.</t>
				<t>The recommended method of Babel speaker configuration for multi-domain
				authentication is not only using a different authentication key for each
				domain, but also using a separate CSA for each domain, even when hash
				algorithms are the same. This allows for fair competition between CSAs and
				sometimes limits consequences of a possible misconfiguration to the scope
				of one CSA. See also item (e) of <xref target="security" />.</t>
			</section>
			<section anchor="migration" title="Migration to and from Authenticated Exchange">
				<t>It is common in practice to consider a migration to authenticated
				exchange of routing information only after the network has already been
				deployed and put to an active use. Performing the migration in a way
				without regular traffic interruption is typically demanded, and this
				specification allows for such a smooth migration using the RxAuthRequired
				interface parameter defined in <xref target="RxAuthRequired" />. This
				measure is similar to the "transition mode" suggested in Section 5 of
				<xref target="OSPF3-AUTH" />.</t>
				<t>An operator performing the migration needs to arrange configuration
				changes as follows:
				<list style="numbers">
					<t>Decide on particular hash algorithm(s) and key(s) to be used.</t>
					<t>Identify all speakers and their involved interfaces that need to be
					migrated to authenticated exchange.</t>
					<t>For each of the speakers and the interfaces to be reconfigured first
					set RxAuthRequired parameter to FALSE, then configure necessary CSA(s).</t>
					<t>Examine the speakers to confirm, that Babel packets are successfully
					authenticated according to the configuration (supposedly, through
					examining ANM table entries and authentication-specific statistics, see
					<xref target="dataflows" />), and address any discrepancies before
					proceeding further.</t>
					<t>For each of the speakers and the reconfigured interfaces set
					RxAuthRequired parameter to TRUE.</t>
				</list>
				Likewise, temporarily setting RxAuthRequired to FALSE can be used to
				migrate smoothly from authenticated packet exchange back to unauthenticated
				one.</t>
			</section>
			<section anchor="exhaustion" title="Handling of Authentication Keys Exhaustion">
				<t>This specification employs a common concept of multiple authenticaion
				keys co-existing for a given interface, with two independent lifetime
				ranges associated with each key (one for sending and another for
				receiving). It is typically recommended to configure the keys using finite
				lifetimes, adding new keys before the old keys expire. However, it is
				obviously possible for all keys to expire for a given interface (for
				sending or receiving or both). Possible ways of addressing this situation
				raise their own concerns:
				<list style="symbols">
					<t>Automatic switching to unauthenticated protocol exchange. This
					behaviour invalidates the initial purposes of authentication and is
					commonly viewed as "unacceptable" (<xref target="RIP2-AUTH" /> Section 5.1,
					<xref target="OSPF2-AUTH" /> Section 3.2, <xref target="OSPF3-AUTH" />
					Section 3).</t>
					<t>Stopping routing information exchange over the interface. This
					behaviour is likely to impact regular traffic routing and is commonly
					viewed as "not advisable" (ibid.).</t>
					<t>Use of the "most recently expired" key over its intended lifetime
					range. This behaviour is commonly recommended for implementation (ibid.),
					although it may become a problem due to an offline cryptographic attack
					(see item (e) of <xref target="security" />) or a compromise of the
					key. In addition, telling a recently expired key from a key never ever
					been in a use may be impossible after a router restart.</t>
				</list>
				Design of this mechanism prevents the automatic switching to
				unauthenticated exchange and is consistent with similar authentication
				mechanisms in this regard. But since the best choice between two other
				options depends on local site policy, this decision is left up to the
				operator rather than the implementer (in a way resembling the "fail
				secure" configuration knob described in Section 5.1 of
				<xref target="RIP2-AUTH" />).</t>
				<t>Although the deriving procedure does not allow for any exceptions in
				expired keys filtering (<xref target="deriving" /> item 2), the operator
				can trivially enforce one of the two remaining behaviour options through
				local key management procedures. In particular, when using the key over
				its intended lifetime is more preferred than regular traffic disruption,
				the operator would explicitly leave the old key expiry time open until the
				new key is added to the router configuration. In the opposite case the
				operator would always configure the old key with a finite lifetime and bear
				associated risks.</t>
			</section>
		</section>

		<section title="Implementation Status">
			<t>[RFC Editor: before publication please remove this section and the
			reference to <xref target="I-D.sheffer-running-code" />, along the offered
			experiment of which this section exists to assist document reviewers.]</t>
			<t>At the time of this writing the original Babel protocol is available in
			two free, production-quality implementations:
			<list style="symbols">
				<t>The "standalone" babeld, a BSD-licensed software with source code
				available on <eref target="https://github.com/jech/babeld">GitHub</eref>.
				<vspace blankLines="1" />
				That implementation does not support this authentication mechanism.</t>
				<t>The integrated babeld component of Quagga-RE, a work derived from Quagga
				routing protocol suite, a GPL-lisensed software with source code available
				on <eref target="https://github.com/Quagga-RE/quagga-RE">GitHub</eref>.
				<vspace blankLines="1" />
				That implementation supports this authentication mechanism as defined in
				revision 02 of this document. It supports both mandatory-to-implement hash
				algorithms and a few additional algorithms. It does not support more than
				one link-local IPv6 address per interface. It implements
				authentication-specific parameters, data structures and methods as follows
				(whether a parameter can be "changed at runtime", it is done by means of CLI
				and can also be set in a configuration file):
				<list style="symbols">
					<t>MaxDigestsIn value is fixed to 4.</t>
					<t>MaxDigestsOut value is fixed to 4.</t>
					<t>RxAuthRequired value is specific to each interface and can be changed
					at runtime.</t>
					<t>ANM Table contents is not retained across speaker restarts, can be
					retrieved and reset (all entries at once) by means of CLI.</t>
					<t>ANM Timeout value is specific to the whole protocol instance, has a
					default of 300 and can be changed at runtime.</t>
					<t>Ordering of elements within each interface's sequence of CSAs is
					arbitrary as set by operator at runtime. CSAs are implemented to refer
					to existing key chain syntax items. Elements of an interface's sequence
					of CSAs are constrained to be unique reference-wise, but not
					contents-wise, that is, it is possible to duplicate security associations
					using a different key chain name to contain the same keys.</t>
					<t>Ordering of elements within each KeyChain sequence is fixed to the sort
					order of LocalKeyID. LocalKeyID is constrained to be unique within each
					KeyChain sequence.</t>
					<t>TS/PC number updates method can be configured at runtime for the whole
					protocol instance to one of two methods standing for items (a) and (b) of
					<xref target="tspcmgmt" />. The default method is (b).</t>
					<t>Most of the authentication-specific statistics counters listed in
					<xref target="stats" /> are implemented and their readings are available
					by means of CLI with an option to log respective events into a file.</t>
				</list>
				No other implementations of this authentication mechanism are known to
				exist, thus interoperability can only be assessed on paper. The only existing
				implementation has been tested to be fully compatible with itself.</t>
			</list></t>
		</section>

		<section anchor="security" title="Security Considerations">
			<t>Use of this mechanism implies requirements common to a use of shared
			authentication keys, including, but not limited to:
			<list style="symbols">
				<t>holding the keys secret,</t>
				<t>including sufficient amount of random bits into each key,</t>
				<t>rekeying on a regular basis, and</t>
				<t>never reusing a used key for a different purpose</t>
			</list>
			That said, proper design and implementation of a key management policy is
			out of scope of this work. Many publications on this subject exist and
			should be used for this purpose.</t>
			<t>Considering particular attacks being in-scope or out of scope on one hand
			and measures taken to protect against particular in-scope attacks on the
			other, the original Babel protocol and this authentication mechanism are in
			line with similar datagram-based routing protocols and their respective
			mechanisms. In particular, the primary concerns addressed are:
			<list style="format %c." counter="secitems">
				<t>Peer Entity Authentication<vspace blankLines="1" />
				Babel speaker authentication mechanism defined herein is believed to be
				as strong as is the class itself that it belongs to. This specification
				is built on the fundamental concepts implemented for authentication of
				similar routing protocols: per-packet authentication, use of HMAC
				construct, use of shared keys. Although this design approach does not
				address all possible concerns, it is so far known to be sufficient for most
				practical cases.</t>
				<t>Data Integrity<vspace blankLines="1" />
				Meaningful parts of a Babel datagram are the contents of the Babel packet
				(in the definition of Section 4.2 of <xref target="BABEL" />) and IPv6
				source address of the datagram (Section 3.5.3 ibid.). This mechanism
				authenticates both parts using a HMAC construct, so that making any
				meaningful change to an authenticated packet after it has been emitted by
				the sender should be as hard as attacking the hash algorithm itself or
				successfully recovering the authentication key.<vspace blankLines="1" />
				Note well that any trailing data of the Babel datagram is not meaningful
				in the scope of the original specification and does not belong to the
				Babel packet. Integrity of the trailing data is respectively not protected
				by this mechanism. At the same time, although any TLV extra data is also
				not meaningful in the same scope, its integrity is protected, since this
				extra data is a part of the Babel packet (see
				<xref target="datagram_structure" />).</t>
				<t>Replay Attacks<vspace blankLines="1" />
				This specification establishes a basic replay protection measure (see
				<xref target="anm_table" />), defines a timeout parameter affecting its
				strength (see <xref target="anm_timeout" />), and outlines implementation
				methods also affecting protection strength in several ways (see
				<xref target="tspcmgmt" />). Implementer's choice of the timeout value and
				particular implementation methods may be suboptimal due to, for example,
				insufficient hardware resources of the Babel speaker. Furthermore, it may
				be possible, that an operator configures the timeout and the methods to
				address particular local specifics and this further weakens the
				protection. An operator concerned about replay attack protection strength
				should understand these factors and their meaning in a given network
				segment.</t>
				<t>Denial of Service<vspace blankLines="1" />
				Proper deploy of this mechanism in a Babel network significantly increases
				the efforts required for an attacker to feed arbitrary Babel PDUs into
				protocol exchange (with an intent of attacking a particular Babel speaker
				or disrupting exchange of regular traffic in a routing domain). It also
				protects the neighbour table from being flooded with forged speaker
				entries.<vspace blankLines="1" />
				At the same time, this protection comes for a price of CPU time being spent
				on HMAC computations. This may be a concern for low-performance CPUs
				combined with high-speed interfaces, as sometimes is seen in embedded
				systems and hardware routers. The MaxDigestsIn parameter, which is purposed
				to limit the maximum amount of CPU time spent on a single received Babel
				packet, addresses this concern to some extent.</t>
			</list>
			The following in-scope concerns are not addressed:
			<list style="format %c." counter="secitems">
				<t>Offline Cryptographic Attacks<vspace blankLines="1" />
				This mechanism is an obvious subject to offline cryptographic attacks. As
				soon as an attacker has obtained a copy of an authenticated Babel packet
				of interest (which gets easier to do in wireless networks), he has got all
				the parameters of the authentication-specific processing performed by the
				sender, except authentication key(s) and choice of particular hash
				algorithm(s). Since digest lengths of common hash algorithms are well-known
				and can be matched with those seen in the packet, complexity of this attack
				is essentially that of the authentication key attack.<vspace blankLines="1" />
				Viewing cryptographic strength of particular hash algorithms as a concern
				of its own, the main practical means of resisting offline cryptographic
				attacks on this mechanism are periodic rekeying and use of strong keys
				with sufficient amount of random bits.<vspace blankLines="1" />
				It is important to understand, that in the case of multiple keys being used
				within single interface (for a multi-domain authentication or during a key
				rollover) strength of the combined configuration would be that of the
				weakest key, since only one successful HMAC test is required for an
				authentic packet. Operators concerned about offline cryptographic attacks
				should enforce the same strength policy for all keys used for a given
				interface.<vspace blankLines="1" />
				Note that a special pathological case is possible with this mechanism.
				Whenever two or more authentication keys are configured for a given
				interface such that all keys share the same AuthKeyOctets and the same
				HashAlgo, but LocalKeyID modulo 2^16 is different for each key, these keys
				will not be treated as duplicate (<xref target="deriving" /> item 4), but
				a HMAC result computed for a given packet will be the same for each of
				these keys. In the case of sending procedure this can produce multiple HMAC
				TLVs with exactly the same value of the Digest field, but different value
				of KeyID field. In this case the attacker will see that the keys are the
				same, even without the knowledge of the key itself. Reuse of authentication
				keys is not the intended use case of this mechanism and should be strongly
				avoided.</t>
				<t>Non-repudiation<vspace blankLines="1" />
				This specification relies on a use of shared keys. There is no timestamp
				infrastructure and no key revocation mechanism defined to address a shared
				key compromise. Establishing the time that a particular authentic Babel
				packet was generated is thus not possible. Proving, that a particular Babel
				speaker had actually sent a given authentic packet is also impossible as
				soon as the shared key is claimed compromised. Even with the shared key
				not being compromised, reliably identifying the speaker that had actually
				sent a given authentic Babel packet is not possible any better than proving
				the speaker to belong to the group sharing the key (any of the speakers
				sharing a key can impose any other speaker sharing the same key).</t>
				<t>Confidentiality Violations<vspace blankLines="1" />
				The original Babel protocol does not encrypt any of the information
				contained in its packets. Contents of a Babel packet is trivial to decode,
				revealing network topology details. This mechanism does not improve this
				situation in any way. Since routing protocol messages are not the only kind
				of information subject to confidentiality concerns, a complete solution
				to this problem is likely to include measures based on the channel security
				model, such as IPSec and WPA2 at the time of this writing.</t>
				<t>Key Management<vspace blankLines="1" />
				Any authentication key exchange/distribution concerns are left out of
				scope. However, the internal representation of authentication keys (see
				<xref target="csa" />) allows for diverse key management means, manual
				configuration in the first place.</t>
				<t>Message Deletion<vspace blankLines="1" />
				Any message deletion attacks are left out of scope. Since a datagram
				deleted by an attacker cannot be distinguished from a datagram naturally
				lost in transmission and since datagram-based routing protocols are
				designed to withstand a certain loss of packets, the currently established
				practice is treating authentication purely as a per-packet function without
				any added detection of lost packets.</t>
			</list></t>
		</section>

		<section title="IANA Considerations">
			<t>[RFC Editor: please do not remove this section.]</t>
			<t>At the time of this publication Babel TLV Types namespace did not have
			an IANA registry. TLV types 11 and 12 were assigned
			(see <xref target="tlv_namespace" />) to the TS/PC and HMAC
			TLV types by Juliusz Chroboczek, designer of the original Babel protocol.
			Therefore, this document has no IANA actions.</t>
				<texttable anchor="tlv_namespace" title="Babel TLV types namespace">
					<ttcol align="right">Value</ttcol>
					<ttcol>Code</ttcol>
					<ttcol>Reference</ttcol>
					<c>0</c>
					<c>Pad1</c>
					<c><xref target="BABEL" /></c>
					<c>1</c>
					<c>PadN</c>
					<c><xref target="BABEL" /></c>
					<c>2</c>
					<c>Acknowledgement Request</c>
					<c><xref target="BABEL" /></c>
					<c>3</c>
					<c>Acknowledgement</c>
					<c><xref target="BABEL" /></c>
					<c>4</c>
					<c>Hello</c>
					<c><xref target="BABEL" /></c>
					<c>5</c>
					<c>IHU</c>
					<c><xref target="BABEL" /></c>
					<c>6</c>
					<c>Router-Id</c>
					<c><xref target="BABEL" /></c>
					<c>7</c>
					<c>Next Hop</c>
					<c><xref target="BABEL" /></c>
					<c>8</c>
					<c>Update</c>
					<c><xref target="BABEL" /></c>
					<c>9</c>
					<c>Route Request</c>
					<c><xref target="BABEL" /></c>
					<c>10</c>
					<c>Seqno Request</c>
					<c><xref target="BABEL" /></c>
					<c>11</c>
					<c>TS/PC</c>
					<c>this document</c>
					<c>12</c>
					<c>HMAC</c>
					<c>this document</c>
				</texttable>
		</section>

		<section title="Acknowledgements">
			<t>Thanks to Randall Atkinson and Matthew Fanto for their comprehensive work on
			<xref target="RIP2-AUTH" /> that initiated a series of publications on
			routing protocols authentication, including this one. This specification
			adopts many concepts belonging to the whole series.</t>
			<t>Thanks to Juliusz Chroboczek for his works on mesh networking in general
			and Babel routing protocol in particular, and also for feedback on early
			revisions of this document. This work would not be possible without prior
			works on Babel. Thanks to Gabriel Kerneis for reviewing early revisions of
			this document.</t>
			<t>Thanks to Jim Gettys and Dave Taht for developing CeroWrt wireless router
			project and collaborating on many integration issues. A practical need for
			Babel authentication emerged during a research based on CeroWrt that
			eventually became the very first use case of this mechanism.</t>
			<t>Thanks to Kunihiro Ishiguro and Paul Jakma for establishing GNU Zebra and
			Quagga routing software projects respectively. Thanks to Werner Koch, the
			author of Libgcrypt. The very first implementation of this mechanism was made
			on base of Quagga and Libgcrypt.</t>
			<t>This document was produced using the xml2rfc
			(<xref target="RFC2629" />) authoring tool.</t>
		</section>
	</middle>

	<back>
		<references title="Normative References">
			<?rfc include="reference.RFC.2104.xml"?>
			<?rfc include="reference.RFC.2119.xml"?>
			<reference anchor="FIPS-198">
				<front>
					<title>The Keyed-Hash Message Authentication Code (HMAC)</title>
					<author initials="" surname="US National Institute of Standards & Technology">
						<organization>Unknown</organization>
					</author>
					<date month="March" year="2002" />
				</front>
				<seriesInfo name="FIPS PUB 198" value="" />
			</reference>
			<reference anchor="BABEL">
				<front>
					<title>The Babel Routing Protocol</title>
					<author initials="J." surname="Chroboczek" fullname="J. Chroboczek"></author>
					<date year="2011" month="April" />
				</front>
				<seriesInfo name="RFC" value="6126" />
			</reference>
			<?rfc include="reference.I-D.sheffer-running-code"?>
		</references>
		<references title="Informative References">
			<?rfc include="reference.RFC.2629.xml"?>
			<reference anchor="RIP2-AUTH">
				<front>
					<title>RIPv2 Cryptographic Authentication</title>
					<author initials="R." surname="Atkinson" fullname="R. Atkinson"></author>
					<author initials="M." surname="Fanto" fullname="M. Fanto"></author>
					<date year="2007" month="February" />
				</front>
				<seriesInfo name="RFC" value="4822" />
			</reference>
			<reference anchor="OSPF2-AUTH">
				<front>
					<title>OSPFv2 HMAC-SHA Cryptographic Authentication</title>
					<author initials="M." surname="Bhatia" fullname="M. Bhatia"></author>
					<author initials="V." surname="Manral" fullname="V. Manral"></author>
					<author initials="M." surname="Fanto" fullname="M. Fanto"></author>
					<author initials="R." surname="White" fullname="R. White"></author>
					<author initials="M." surname="Barnes" fullname="M. Barnes"></author>
					<author initials="T." surname="Li" fullname="T. Li"></author>
					<author initials="R." surname="Atkinson" fullname="R. Atkinson"></author>
					<date year="2009" month="October" />
				</front>
				<seriesInfo name="RFC" value="5709" />
			</reference>
			<?rfc include="reference.RFC.6039.xml"?>
			<reference anchor="OSPF3-AUTH">
				<front>
					<title>Supporting Authentication Trailer for OSPFv3</title>
					<author initials="M." surname="Bhatia" fullname="M. Bhatia"></author>
					<author initials="V." surname="Manral" fullname="V. Manral"></author>
					<author initials="A." surname="Lindem" fullname="A. Lindem"></author>
					<date year="2012" month="February" />
				</front>
				<seriesInfo name="RFC" value="6506" />
			</reference>
			<?rfc include="reference.RFC.6709.xml"?>
		</references>
		<section title="Figures">
			<figure anchor="dataflows" title="Interaction Diagram">
				<artwork align="center"><![CDATA[
+-------------------------------------------------------------+
|              authentication-specific statistics             |
+-------------------------------------------------------------+
  ^                            |                            ^
  |                            v                            |
  |    +-----------------------------------------------+    |
  |    |                system operator                |    |
  |    +-----------------------------------------------+    |
  |        ^ |      ^ |       ^ |       ^ |      ^ |        |
  |        | v      | |       | |       | |      | v        |
+---+  +---------+  | |       | |       | |  +---------+  +---+
|   |->|   ANM   |  | |       | |       | |  | LocalTS |->|   |
| R |<-|  table  |  | |       | |       | |  | LocalPC |<-| T |
| x |  +---------+  | v       | v       | v  +---------+  | x |
|   |  +----------------+ +---------+ +----------------+  |   |
| p |  | MaxDigestsIn   | |         | | MaxDigestsOut  |  | p |
| r |<-| ANM timeout    | |  CSAs   | |                |->| r |
| o |  | RxAuthRequired | |         | |                |  | o |
| c |  +----------------+ +---------+ +----------------+  | c |
| e |  +-------------+     |       |     +-------------+  | e |
| s |  |   Rx ESAs   |     |       |     |   Tx ESAs   |  | s |
| s |<-| (temporary) |<----+       +---->| (temporary) |->| s |
| i |  +-------------+                   +-------------+  | i |
| n |  +------------------------------+----------------+  | n |
| g |  |     instance of              | output buffers |=>| g |
|   |=>|     the original             +----------------+  |   |
|   |  |     protocol                 | source address |->|   |
+---+  +------------------------------+----------------+  +---+
 /\                                            |            ||
 ||                                            v            \/
+-------------------------------------------------------------+
|                         IPv6 stack                          |
+-------------------------------------------------------------+
   /\ ||       /\ ||                       /\ ||       /\ ||
   || \/       || \/                       || \/       || \/
+---------+ +---------+                 +---------+ +---------+
| speaker | | speaker |       ...       | speaker | | speaker |
+---------+ +---------+                 +---------+ +---------+

Flow of Babel datagrams: ===>        Flow of control data: --->

				]]></artwork>
			</figure>
			<figure anchor="datagram_structure" title="Babel Datagram Structure">
				<preamble>The diagram below depicts structure of two Babel datagrams. The
				left datagram contains an unauthenticated Babel packet and an optional
				trailing data block. The right datagram, besides these, contains
				authentication-specific TLVs in the Babel packet body.</preamble>
				<artwork align="center">
+-------------------+ -------     ------- +-------------------+
|   Babel packet    |      ^       ^      |   Babel packet    |
|      header       |      |       |      |      header       |
+-------------------+ --   |       |   -- +-------------------+
|     some TLV      | ^    |       |    ^ |     some TLV     |
+-------------------+ |    |       |    | +-------------------+
|     some TLV      | |    | P     |    | |     some TLV      |
+-------------------+ |    |       |    | +-------------------+
|       (...)       | | B  |       |    | |       (...)       |
+-------------------+ |    |       |    | +-------------------+
|     some TLV      | |    |     P |    | |     some TLV      |
+-------------------+ |    |       |    | +-------------------+
|     some TLV      | v    v       |  B | |     some TLV      |
+-------------------+ -------      |    | +-------------------+
| optional trailing |              |    | |     TS/PC TLV     |
|    data block     |              |    | +-------------------+
+-------------------+              |    | |     HMAC TLV      |
                                   |    | +-------------------+
                                   |    | |       (...)       |
                                   |    | +-------------------+
    P: Babel packet                v    v |     HMAC TLV      |
    B: Babel packet body          ------- +-------------------+
                                          | optional trailing |
                                          |    data block     |
                                          +-------------------+
				</artwork>
			</figure>
			<figure anchor="padded_digest" title="A Padded HMAC TLV">
				<preamble>The diagram below depicts a sample HMAC TLV corresponding to a
				hash algorithm with digest length of 20 octets (such as RIPEMD-160). Its
				Digest field is fully padded using IPv6 address
				fe80&wj;:&wj;:&wj;0a11&wj;:&wj;96ff&wj;:&wj;fe1c&wj;:&wj;10c8 for the first
				16 octets and 0x00 for the subsequent octets.</preamble>
				<artwork align="left">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type = 12  |  Length = 22  |         KeyID = 12345         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Digest = 0xFE         80              00              00      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       00              00              00              00      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       0A              11              96              FF      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       FE              1C              10              C8      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       00              00              00              00      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
				</artwork>
			</figure>
			<figure anchor="filled_digest" title="A HMAC TLV with a HMAC Result">
				<preamble>The diagram below depicts the same HMAC TLV with all 20 octets
				of a sample HMAC result written to the Digest field.</preamble>
				<artwork align="left">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type = 12  |  Length = 22  |         KeyID = 12345         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Digest = 0x4F         C8              C8              9D      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       57              83              91              9B      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       81              B0              90              47      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       B4              2F              E3              37      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       A7              BE              93              83      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
				</artwork>
			</figure>
		</section>
	</back>
</rfc>

PAFTECH AB 2003-20262026-04-24 05:40:11