<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-bmp-tcp-ao-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-bmp-tcp-ao-00"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="04"/>
    <keyword>BMP Security</keyword>
    <keyword>TCP-AO for BMP</keyword>
    <abstract>
      <?line 28?>

<t>This document outlines the utilization of the Transmission Control Protocol - Authentication Option (TCP-AO), as prescribed in RFC5295, for the authentication of Border Gateway Protocol Monitoring Protocol (BMP) sessions, as specified in RFC7854. The intent is to heighten security within the underlying Transmission Control Protocol (TCP) transport layer, ensuring the authentication of BMP sessions conducted between routers and BMP stations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao"/>.</t>
    </note>
  </front>
  <middle>
    <?line 33?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as specified in RFC7854, recommends employing Internet Protocol Security (IPSec) from RFC4303 to mitigate security concerns related to the Transmission Control Protocol (TCP) session between routers and the BMP station managing BGP route collection. Recognizing the practical limitations of IPSec, this document underscores the preference for the use of Transmission Control Protocol - Authentication Option (TCP-AO) as the authentication method of choice for TCP-based network protocols such as BGP and LDP. A comprehensive discussion of TCP-AO is provided in RFC5295.</t>
    </section>
    <section anchor="tcp-ao-protection-for-bgp-monitoring-protocol-bmp">
      <name>TCP-AO Protection for BGP Monitoring Protocol (BMP)</name>
      <t>The BGP Monitoring Protocol (BMP) outlined in RFC7854 plays a crucial role in network management by allowing routers to share information about their BGP tables, helping operators monitor and troubleshoot their networks effectively. However, the security considerations associated with BMP have become increasingly critical in light of evolving cyber threats. This document addresses these concerns by introducing a framework that utilizes the Transmission Control Protocol - Authentication Option (TCP-AO), specified in RFC5295, to safeguard BMP sessions.</t>
      <t>Extending this security measure to BMP helps mitigate risks associated with unauthorized access, tampering, and other potential security vulnerabilities. By integrating TCP-AO into BMP implementations, network operators can establish a more resilient and trustworthy foundation for BGP monitoring activities.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the BMP session gets a boost with TCP-AO, seamlessly implemented over the existing TCP transport, ensuring heightened protection without any additional load.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC5295">
        <front>
          <title>Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)</title>
          <author fullname="J. Salowey" initials="J." surname="Salowey"/>
          <author fullname="L. Dondeti" initials="L." surname="Dondeti"/>
          <author fullname="V. Narayanan" initials="V." surname="Narayanan"/>
          <author fullname="M. Nakhjiri" initials="M." surname="Nakhjiri"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>The Extensible Authentication Protocol (EAP) defined the Extended Master Session Key (EMSK) generation, but reserved it for unspecified future uses. This memo reserves the EMSK for the sole purpose of deriving root keys. Root keys are master keys that can be used for multiple purposes, identified by usage definitions. This document also specifies a mechanism for avoiding conflicts between root keys by deriving them in a manner that guarantees cryptographic separation. Finally, this document also defines one such root key usage: Domain-Specific Root Keys are root keys made available to and used within specific key management domains. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5295"/>
        <seriesInfo name="DOI" value="10.17487/RFC5295"/>
      </reference>
      <reference anchor="RFC7854">
        <front>
          <title>BGP Monitoring Protocol (BMP)</title>
          <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
          <author fullname="R. Fernando" initials="R." surname="Fernando"/>
          <author fullname="S. Stuart" initials="S." surname="Stuart"/>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7854"/>
        <seriesInfo name="DOI" value="10.17487/RFC7854"/>
      </reference>
    </references>
    <?line 55?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a result of BMP integration into the network. While TCP-AO safeguards other TCP protocols, BMP lacks the same level of protection within this context.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
