Internet DRAFT - draft-ietf-karp-crypto-key-table
draft-ietf-karp-crypto-key-table
INTERNET-DRAFT R. Housley
Internet Engineering Task Force (IETF) Vigil Security
Intended Status: Standards Track T. Polk
NIST
S. Hartman
Painless Security
D. Zhang
Huawei
Expires: 4 June 2014 4 December 2013
Database of Long-Lived Symmetric Cryptographic Keys
<draft-ietf-karp-crypto-key-table-10.txt>
Abstract
This document specifies the information contained in a conceptual
database of long-lived cryptographic keys used by many different
routing protocols for message security. The database is designed to
support both manual and automated key management. In addition to
describing the schema for the database, this document describes the
operations that can be performed on the database as well as the
requirements for the routing protocols that wish to use the database.
In many typical scenarios, the protocols do not directly use the
long-lived key, but rather a key derivation function is used to
derive a short-lived key from a long-lived key.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Housley, et al [Page 1]
INTERNET-DRAFT 4 December 2013
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
1. Introduction
This document specifies the information that needs to be included in
a database of long-lived cryptographic keys in order to key the
cryptographic authentication of routing protocols. This conceptual
database is designed to separate protocol-specific aspects from both
manual and automated key management. The intent is to allow many
different implementation approaches to the specified cryptographic
key database, while simplifying specification and heterogeneous
deployments. This conceptual database avoids the need to build
knowledge of any security protocol into key management protocols. It
minimizes protocol-specific knowledge in operational/management
interfaces, but it constrains where that knowledge can appear.
Textual conventions are provided for the representation of keys and
other identifiers. These conventions should be used when presenting
keys and identifiers to operational/management interfaces or reading
keys/identifiers from these interfaces. This satisfies the
operational requirement that all implementations represent the keys
and key identifiers in the same way so that cross-vendor
configuration instructions can be provided.
Routing protocols can employ the services of more generic security
protocols such as TCP-AO [RFC5925]. Implementations of routing
protocols may need to supply keys to databases specific to these
security protocols as the associated entries in this document's
conceptual database are manipulated.
In many instances, the long-lived keys are not used directly in
security protocols, but rather a key derivation function is used to
derive short-lived keys from the long-lived key in the database. In
other instances, security protocols will directly use the long-lived
key from the database. The database design supports both use cases.
Housley, et al [Page 2]
INTERNET-DRAFT 4 December 2013
1.1. Requirements Notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2. Conceptual Database Structure
The database is characterized as a table, where each row represents a
single long-lived symmetric cryptographic key. Normally, each key
should only have one row. Only in the (hopefully) very rare cases
where a key is used for more than one purpose, or where the same key
is used with multiple key derivation functions (KDFs) will multiple
rows contain the same key value. The columns in the table represent
the key value and attributes of the key.
To accommodate manual key management, the format of the fields has
been purposefully chosen to allow updates with a plain text editor
and to provide equivalent display on multiple systems.
The columns that the table consists of are listed as follows:
AdminKeyName
The AdminKeyName field contains a human-readable string meant
to identify the key for the user. Implementations can use this
field to uniquely identify rows in the key table. The same
string can be used on the local system and peer systems, but
this is not required. Routing protocols do not make use of this
string; they use the LocalKeyName and the PeerKeyName. However,
if these strings are to be used as protocol elements in other
protocols or otherwise transferred between systems, they will
need to follow the requirements of section 5.1.
LocalKeyName
The LocalKeyName field contains a string identifying the key.
It can be used to retrieve the key in the local database when
received in a message. As discussed in Section 4, the
protocol defines the form of this field. For example, many
routing protocols restrict the format of their key names to
integers that can be represented in 16 or 32 bits. Typically
this field does not contain data in human character sets
requiring internationalization. If there ever are any routing
Protocols with key names requiring internationalization, those
specifications need to address issues of canonicalization and
normalization so that key names can be compared using binary
comparison.
Housley, et al [Page 3]
INTERNET-DRAFT 4 December 2013
PeerKeyName
PeerKeyName is the name of the key used by the local system in
an outgoing message. For unicast communication, the PeerKeyName
of a key on a system matches the LocalKeyName of the identical
key that is maintained on one or multiple peer systems. Similar
to LocalKeyName, a protocol defines the form of this identifier
and will often restrict it to be an integer. For group keys,
the protocol will typically require this field be an empty
string as the sending and the receiving key names need to be
the same.
Peers
Typically for unicast keys, this field lists the peer systems
that have this key in their database. For group keys this field
names the groups for which the key is appropriate. For example,
this might name a routing area for a multicast routing
protocol. Formally, this field provides a protocol-specific set
of restrictions on the scope in which the key is appropriate.
The format of the identifiers in the Peers field is specified
by the protocol.
Interfaces
The Interfaces field identifies the set of physical and/or
virtual interfaces for which it is appropriate to use this key.
When the long-lived value in the Key field is intended for use
on any interface, this field is set to "all". The interfaces
field consists of a set of strings; the form of these strings
is specified by the implementation and is independent of the
protocol in question. Protocols may require support for the
interfaces field or may indicate that support for constraining
keys based on interface is not required. As an example, TCP-AO
implementations are unlikely to make the decision of what
interface to use prior to key selection. In this case, the
implementations are expected to use the same keying material
across all of the interfaces and then require the "all"
setting.
Protocol
The Protocol field identifies a single routing protocol where
this key may be used to provide cryptographic protection. This
specification establishes a registry for this field; the
registry also specifies the format of the following field,
ProtocolSpecificInfo, for each registered protocol.
Housley, et al [Page 4]
INTERNET-DRAFT 4 December 2013
ProtocolSpecificInfo
This field contains the protocol-specified information that may
be useful for a protocol to apply the key correctly. Note that
such information MUST NOT be required for a protocol to locate
an appropriate key. When a protocol does not need the
information in ProtocolSpecificInfo, it will require this field
be empty. Key table rows MAY specify a Direction of "both".
As a result, the encoding of this field needs to support
encoding protocol specific information for sending and
receiving in the same row.
KDF
The KDF field indicates the key derivation function which is
used to generate short-lived keys from the long-lived value in
the Key field. When the long-lived value in the Key field is
intended for direct use, the KDF field is set to "none". A key
derivation function is a one-way function that provides
cryptographic separation of key material. The KDF MAY use
inputs from the row in the key table and the message being sent
or received but MUST NOT depend on other configuration state.
This document establishes an IANA registry for the values in
the KDF field to simplify references in future specifications.
The protocol indicates what (if any) KDFs are valid.
AlgID
The AlgID field indicates which cryptographic algorithm to be
used with the security protocol for the specified peer or
peers. Such an algorithm can be an encryption algorithm and
mode (e.g., AES-128-CBC), an authentication algorithm (e.g.,
HMAC-SHA1-96 or AES-128-CMAC), or any other symmetric
cryptographic algorithm needed by a security protocol. If the
KDF field contains "none", then the long-lived key is used
directly with this algorithm, otherwise the derived short-lived
key is used with this algorithm. When the long-lived key is
used to generate a set of short-lived keys for use with the
security protocol, the AlgID field identifies a ciphersuite
rather than a single cryptographic algorithm. This document
establishes an IANA registry for the values in the AlgID field
to simplify references in future specifications. Protocols
indicate which algorithms are appropriate.
Key
The Key field contains a long-lived symmetric cryptographic key
in the format of a lower-case hexadecimal string. The size of
the Key depends on the KDF and the AlgID. For instance, a
KDF=none and AlgID=AES128 requires a 128-bit key, which is
represented by 32 hexadecimal digits.
Housley, et al [Page 5]
INTERNET-DRAFT 4 December 2013
Direction
The Direction field indicates whether this key may be used for
inbound traffic, outbound traffic, both, or whether the key
has been disabled and may not currently be used at all. The
supported values are "in", "out", "both", and "disabled",
respectively. The Protocol field will determine which of these
values are valid.
SendLifetimeStart
The SendLifetimeStart field specifies the earliest date and
time in Coordinated Universal Time (UTC) at which this key
should be considered for use when sending traffic. The format
is YYYYMMDDHHSSZ, where four digits specify the year, two
digits specify the month, two digits specify the day, two
digits specify the hour, two digits specify the minute, and
two digits specify the second. The "Z" is included as a clear
indication that the time is in UTC.
SendLifeTimeEnd
The SendLifeTimeEnd field specifies the latest date and time at
which this key should be considered for use when sending
traffic. The format is the same as the SendLifetimeStart
field.
AcceptLifeTimeStart
The AcceptLifeTimeStart field specifies the earliest date and
time in Coordinated Universal Time (UTC) at which this key
should be considered for use when processing received traffic.
The format is YYYYMMDDHHSSZ, where four digits specify the
year, two digits specify the month, two digits specify the day,
two digits specify the hour, two digits specify the minute, and
two digits specify the second. The "Z" is included as a clear
indication that the time is in UTC.
AcceptLifeTimeEnd
The AcceptLifeTimeEnd field specifies the latest date and time
at which this key should be considered for use when processing
the received traffic. The format of this field is identical to
the format of AcceptLifeTimeStart.
3. Key Selection and Rollover
A protocol may directly consult the key table to find the key to use
on an outgoing message. The protocol provides a protocol (P) and a
peer identifier (H) into the key selection function. Optionally, an
interface identifier (I) may also need to be provided. Any key that
Housley, et al [Page 6]
INTERNET-DRAFT 4 December 2013
satisfies the following conditions may be selected:
(1) the Peers field includes H;
(2) the Protocol field matches P;
(3) If an interface is specified by the protocol, the Interfaces
field in the key table row includes I or "all";
(4) the Direction field is either "out" or "both"; and
(5) SendLifetimeStart <= current time <= SendLifeTimeEnd.
During key selection, multiple entries may simultaneously exist
associated with different cryptographic algorithms or ciphersuites.
Systems should support selection of keys based on algorithm
preference to facilitate algorithm transition.
In addition, multiple entries with overlapping valid periods are
expected to be available for orderly key rollover. In these cases,
the expectation is that systems will transition to the newest key
available. To meet this requirement, this specification recommends
supplementing the key selection algorithm with the following
differentiation: select the long-lived key specifying the most recent
time in the SendLifetimeStart field.
In order to look up a key for validating an incoming message, the
protocol provides its protocol (P), the peer identifier (H), the key
identifier (L), and optionally the interface (I). If one key matches
the following conditions it is selected:
(1) the Peer field includes H;
(2) the Protocol field matches P;
(3) if the Interface field is provided, it includes I or is
"all";
(4) the Direction field is either "in" or "both";
(5) the LocalKeyName is L; and
(6) AcceptLifeTimeStart <= current time <= AcceptLifeTimeEnd.
Note that the key usage is loosely bound by the times specified in
the AcceptLifeTimeStart and AcceptLifeTimeEnd fields. New security
associations should not be established except within the period of
use specified by these fields, while allowing some grace time for
Housley, et al [Page 7]
INTERNET-DRAFT 4 December 2013
clock skew. However, if a security association has already been
established based on a particular long-lived key, exceeding the
lifetime does not have any direct impact. The implementations of
security protocols that involve long-lived security association
should be designed to periodically interrogate the database and
rollover to new keys without tearing down the security association.
Rather than consulting the conceptual database, a security protocol
such as TCP-AO may update its own tables as keys are added and
removed. In this case, the protocol needs to maintain its own key
information. Some routing protocols use IP Security (IPsec) to
provide integrity. If a specification describes how to use the
conceptual database described in this document to configure keys for
these routing protocols, similar concerns apply. The specification
mapping those routing protocols onto this conceptual database needs
to describe how the Security Policy Database is manipulated as rows
are added and removed from the conceptual database.
4. Application of the Database in a Security Protocol
In order to use the key table database in a protocol specification, a
protocol needs to specify certain information. This section
enumerates items that a protocol must specify.
(1) The ways of mapping the information in a key table row to the
information needed to produce an outgoing message; specified
either as an explanation of how to fill in authentication-related
fields in a message based on key table information, or for
protocols such as TCP-AO how to construct Master Key Tuples (MKTs)
or other protocol-specific structures from a key table row
(2) The ways of locating the peer identifier (a member of the
Peers set) and the LocalKeyName inside an incoming message
(3) The methods of verifying a message given a key table row;
this may be stated directly or in terms of protocol-specific
structures such as MKTs
(4) The form and validation rules for LocalKeyName and
PeerKeyName; if either of these is an integer, the conventions in
Section 5.1 are used as a vendor-independent format
(5) The form and validation rules for members of the Peers set
(6) The algorithms and KDFs supported
(7) The form of the ProtocolSpecifics field
Housley, et al [Page 8]
INTERNET-DRAFT 4 December 2013
(8) The rules for canonicalizing LocalKeyName, PeerKeyName,
entries in the Peers set, or ProtocolSpecifics; this may include
normalizations such as lower-casing hexadecimal strings
(9) The Indication whether the support for Interfaces is required
by this protocol
The form of the interfaces field is not protocol-specific but instead
is shared among all protocols on an implementation. If a protocol
needs to distinguish instances running over the same interface, this
is included in the specification of peers. Generally it is desirable
to define the specification of peers so that an operator can use the
interfaces field to refer to all instances of a protocol on a link
without having to specify both generic interfaces information and
protocol-specific peer information.
5. Textual Conventions
5.1 Key Names
When a key for a given protocol is identified by an integer key
identifier, the associated key name will be represented as lower case
hexadecimal digits with the most significant octet first. This
integer is padded with leading zero digits until the width of the key
identifier field in the protocol is reached. If a key name contains
non-integer human-readable text, its format and encoding may be an
issue, particularly if it is used in protocol between two different
types of systems. If characters from the ASCII range [RFC20] are
sufficient for a key name, then they SHOULD be used. If characters
outside of that range are desirable or required, then they MUST be in
an encoding of Unicode [UNICODE].
In the case of an AdminKeyName that uses characters outside of the
ASCII range, the AdminKeyName MUST be encoded using UTF-8 [RFC3629]
and SHOULD be normalized using Unicode Normalization Form KC [UAX15]
to maximize the chance that the strings will compare correctly.
However, simply using Unicode Normalization Form KC is not sufficient
to account for all issues of string comparison; refer to [draft-ietf-
precis-framework] for additional information.
5.2 Keys
A key is represented as a lower-case hexadecimal string with the most
significant octet of the key first. As discussed in Section 2, the
length of this string depends on the associated algorithm and KDF.
Housley, et al [Page 9]
INTERNET-DRAFT 4 December 2013
6. Operational Considerations
If the valid periods for long-lived keys do not overlap or the system
clocks are inconsistent, it is possible to construct scenarios where
systems cannot agree upon a long-lived key. When installing a series
of keys to be used one after another, operators should configure the
SendLifetimeStart field of the key to be several hours after the
AcceptLifeTimeStart field of the key to guarantee there is some
overlap. This overlap is intended to address the clock skew issue and
allow for basic operational considerations. Operators may choose to
specify a longer overlap (e.g., several days) to allow for
exceptional circumstances.
7. Security Considerations
Management of encryption and authentication keys has been a
significant operational problem, both in terms of key synchronization
and key selection. For instance, the current guidance [RFC3562]
warns against sharing TCP MD5 keying material between systems, and
recommends changing keys according to a schedule. The same general
operational issues are relevant for the management of other
cryptographic keys.
It has been recognized in [RFC4107] that automated key management is
not viable in multiple scenarios. The conceptual database specified
in this document is designed to accommodate both manual key
management and automated key management. A future specification to
automatically populate rows in the database is envisioned.
Designers should recognize the warning provided in [RFC4107]:
Automated key management and manual key management provide very
different features. In particular, the protocol associated with
an automated key management technique will confirm the liveness of
the peer, protect against replay, authenticate the source of the
short-term session key, associate protocol state information with
the short-term session key, and ensure that a fresh short-term
session key is generated. Moreover, an automated key management
protocol can improve the interoperability by including negotiation
mechanisms for cryptographic algorithms. These valuable features
are impossible or extremely cumbersome to accomplish with manual
key management.
8. IANA Considerations
This specification defines three registries.
Housley, et al [Page 10]
INTERNET-DRAFT 4 December 2013
8.1. KeyTable Protocols
This document requests establishment of a registry called "KeyTable
Protocols".
All assignments to the KeyTable Protocols registry are made on a
specification required basis per Section 4.1 of [RFC5226].
Each registration entry must contain the three fields:
- Protocol Name (unique within the registry);
- Protocol Specific Info; and
- Specification.
The specification needs to describe parameters required for using the
conceptual database as outlined in Section 4. This typically means
that the specification focuses more on the application of security
protocols with the key tables rather than being a new security
protocol specification for general purposes. New protocols may of
course combine information on how to use the key tables database with
the protocol specification.
The registry has three columns. The first column is a string of UTF-8
characters representing the name protocol. The second column is a
string of UTF-8 characters providing a brief description of Protocol
Specific Info. The third column is a reference to a specification
defining how the protocol is used with the key table.
There are no initial registrations.
8.2. KeyTable KDFs
This document requests the establishment of a registry called
"KeyTable KDFs".
All assignments to the KeyTable KDFs registry are made on a First
Come First Served basis per Section 4.1 of RFC 5226.
The registry has three columns. The first column is a string of UTF-8
characters representing the name of a KDF. The second column is a
string of UTF-8 characters providing a brief description of the KDF.
The third column is a reference to a specification defining the KDF,
if available.
Housley, et al [Page 11]
INTERNET-DRAFT 4 December 2013
KDF Description Reference
------------ ---------------------------- ---------
none No KDF is used with this key N/A
AES-128-CMAC AES-CMAC using 128-bit keys [RFC4493]
HMAC-SHA-1 HMAC using the SHA-1 hash [RFC 2104]
8.3. KeyTable AlgIDs
This document requests establishment of a registry called "KeyTable
AlgIDs".
All assignments to the KeyTable AlgIDs registry are made on a First
Come First Served basis per Section 4.1 of RFC 5226.
The registry has three columns. The first column is a string of
UTF-8 characters representing the algorithm identifier (AlgID). The
second column is a string of UTF-8 characters providing a brief
description of the identified algorithm. The third column is a
reference to a specification defining the identified algorithm.
AlgID Description Reference
------------ --------------------------------- ---------
AES-128-CMAC AES-CMAC using 128-bit keys [RFC4493]
AES-128-CMAC-96 AES-128-CMAc truncated to 96-bits [RFC5926]
HMAC-SHA-1-96 HMAC SHA-1 truncated to 96-bits [RFC2104]
9. Acknowledgments
This document reflects many discussions with many different people
over many years. In particular, the authors thank Jari Arkko, Ran
Atkinson, Ron Bonica, Ross Callon, Lars Eggert, Pasi Eronen, Adrian
Farrel, Gregory Lebovitz, Acee Lindem, Sandy Murphy, Eric Rescorla,
Mike Shand, Dave Ward, and Brian Weis for their insights. The
authors additionally thank Brian Weis for supplying text to address
IANA concerns and for help with formatting.
Sam Hartman's work on this draft is funded by Huawei.
10. References
10.1. Normative References
[RFC20] Cerf, V., "ASCII format for network interchange", RFC 20,
October 1969.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Housley, et al [Page 12]
INTERNET-DRAFT 4 December 2013
[UAX15] The Unicode Consortium, "Unicode Standard Annex #15:
Unicode Normalization Forms", August 2012,
<http://unicode.org/reports/tr15/>.
[UNICODE] The Unicode Consortium, "The Unicode Standard", 2013,
<http://www.unicode.org/versions/latest/>.
10.2. Informational References
[draft-ietf-precis-framework]
Saint-Andre, P. and M. Blanchet, "PRECIS Framework:
Preparation and Comparison of Internationalized Strings
in Application Protocols", work-in-progress,
November 21, 2013.
[IEEE802.1X-2010]
IEEE Standard for Local and Metropolitan Area Networks --
Port-Based Network Access Control", February 2010.
[RFC3562] Leech, M., "Key Management Considerations for the TCP MD5
Signature Option", RFC 3562, July 2003.
[RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic
Key Management", RFC 4107, BCP 107, June 2005.
[RFC4493] Song, J., Lee, J., Poovendran, R., and T. Iwata, "The AES-CMAC
Algorithm", RFC 4493, June 2006.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP
Authentication Option", RFC 5925, June 2010.
Housley, et al [Page 13]
INTERNET-DRAFT 4 December 2013
Authors' Addresses
Russell Housley
Vigil Security, LLC
918 Spring Knoll Drive
Herndon, VA 20170
USA
EMail: housley@vigilsec.com
Tim Polk
National Institute of Standards and Technology
100 Bureau Drive, Mail Stop 8930
Gaithersburg, MD 20899-8930
USA
EMail: tim.polk@nist.gov
Sam Hartman
Painless Security, LLC
USA
Email: hartmans@painless-security.com
Dacheng Zhang
Huawei
China
Email: zhangdacheng@huawei.com
Housley, et al [Page 14]