<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-bfd-network-device-authentication-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Application of BFD in Interconnection Authentication">Application of BFD in Network Device Interconnection Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-bfd-network-device-authentication-00"/>
    <author initials="T." surname="Hu" fullname="Ting Hu" role="editor">
      <organization>State Grid Corporation of China</organization>
      <address>
        <postal>
          <street>Chengxin Road</street>
          <city>Nanjing</city>
          <country>China</country>
        </postal>
        <email>huting3@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Li" fullname="Qin Li">
      <organization>State Grid Corporation of China</organization>
      <address>
        <email>liqin@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <author initials="X." surname="Huang" fullname="Xin. Huang">
      <organization>State Grid Corporation of China</organization>
      <address>
        <email>huangxin@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <author initials="X." surname="Zhang" fullname="Xiaofei. Zhang">
      <organization>State Grid Corporation of China</organization>
      <address>
        <email>zhangxiaofei@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <author initials="X." surname="He" fullname="Xiaoyang. He">
      <organization>State Grid Corporation of China</organization>
      <address>
        <email>hexiaoyang2@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="16"/>
    <area>General</area>
    <workgroup>BFD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>This document extends an interface association mechanism based on BFD, which forms a network device interconnection authentication scheme. It triggers the interface down when the authentication fails, ensuring the security of the connected devices.</t>
    </abstract>
  </front>
  <middle>
    <?line 57?>

<section anchor="intro">
      <name>Introduction</name>
      <t>During network O&amp;M, network accessed of unauthenticated network devices may happen with the situations such as improperly operating, device upgrade or replacement. Such unauthenticated device access could pose risks to the network. To avoid such risks, a technology is required to check and verify the connected network devices to ensure a secure access behavior.</t>
      <t>Bidirectional Forwarding Detection (BFD)<xref target="RFC5880"/> provides low-overhead, short-duration detection of failures in the path between adjacent forwarding engines. <xref target="RFC5880"/> defines that the BFD Control packet may include an optional Authentication Section, and this part can be used to carry all necessary information to allow the receiving system determines the validity of its received packets, based on the authentication type in use.</t>
      <t>This document extends an BFD authentication based associated behavior mechanism on interfaces of a network device. In this way, network devices interconnection authentication scheme is achieved. It triggers the interface down when the authentication fails to isolate risky access, ensuring the security of the network.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>When an unauthenticated device was wrongly accessed to the network by accidental, the running network may face risks such as data leakage, link interruption, or even network breakdown, this risks are unbearable to those significant networks which carrying real-time services of production and control, marketing or trading.</t>
      <t>To avoid such risks, a check and verification mechanism is required to ensure the access security of network devices. If accession of a network device is authenticated by the object point, and only after the authentication has been confirmed that the business communication between the two ends is allowed, otherwise, no traffic can be delivered to the target device, then a secured authentication interconnection is qualified. This kind of authentication for network devices requires a technology with the following capability:</t>
      <t>1.It supports secure network connectivity detection capability, and it is applicable to network interconnection protection in both LAN and WAN scenarios.</t>
      <t>2.It supports the capability of associating behaviors between connectivity detection and interfaces link state decision, to control whether traffic on the specific interfaces can be accessed or not.</t>
      <t>3.It supports fast state recovery capability. Once authentication of a attempting device is succussed, the associated interface can be recovered to normal work automatically.</t>
      <t>4.It supports higher frequency detection capability. The detection period is recommended to be millisecond-level, which can depress the impact of network attacks minimally, for example, isolating virus spreading in milliseconds.</t>
      <t>5.It should be well adapted with existing packet-based network (including LSWs, routers, and WLAN APs), which can be achieved by extending or upgrading of current systems software so as to avoid extra hardware investment.</t>
      <t>To sum up, the BFD can meet all these capability and requirements. The access control of network devices can be achieved by using the authenticated detection supported by BFD with its association to the interfaces link control mechanism.</t>
    </section>
    <section anchor="bfd-for-network-devices-interconnection-authentication">
      <name>BFD For Network Devices Interconnection Authentication</name>
      <t>The network device interconnection authentication case only considers the single-hop scenario. Therefore, all BFD Control packets for the session <bcp14>MUST</bcp14> be sent with a Time to Live (TTL) or Hop Limit value of 255.  All received BFD Control packets that are demultiplexed to the session <bcp14>MUST</bcp14> be discarded if the received TTL or Hop Limit is not equal to 255<xref target="RFC5881"/>.</t>
      <t>BFD supports two working modes: echo packet mode and control packet mode. In the network device interconnection authentication case, the two network devices need to authenticate each other, which can not be achieved by echo packet mode. Therefore, the control packet should be used for bidirectional authentication.</t>
      <t><xref target="RFC5880"/> defines that the system may take either an Active role or a Passive role in session initialization. In the network device interconnection authentication case, both the two network devices of a BFD session should take the active role at the same time, and initiate the authentication from each side.</t>
      <t>BFD has two operating modes that may be selected, Asynchronous mode and Demand mode. In the network device interconnection authentication case, BFD should operates in asynchronous mode. After a BFD session is established, periodic packet detection must be enabled on both sides to prevent the connection from being replaced by unauthenticated devices.</t>
    </section>
    <section anchor="interface-link-control-association">
      <name>Interface Link Control Association</name>
      <t>This section defines the interface link control association for BFD to ensure a secure access behavior.The procedure is as follows:</t>
      <t>If BFD with authentication is configured on both sides of the interconnected network device interfaces and the authentication succeeds, the BFD session status changes from Down to Up, and the protocol status of the interface remains Up. If a device  detects that the BFD keepalive timer expires or the BFD configuration on the peer is modified, the associated interface protocol status on the device should be Down immediately.</t>
      <t>If  BFD with authentication is configured on both sides of the interconnected network device interfaces and the authentication fails, or if the BFD with authentication is configured on only one side of the interconnected device interfaces, the BFD session initiation fails. The network device with authenticated BFD configured should wait N (N equal to 1-300) seconds and then the associated interface protocol status on the network device should be Down. If the configuration on the peer is modified, and the BFD session can be re-initiated. After the authentication succeeds, the BFD session status changes from DOWN to UP, and the associated interface protocol status also should be changed from DOWN to UP.</t>
    </section>
    <section anchor="packet-formats">
      <name>Packet Formats</name>
      <t>## BFD control packet format</t>
      <t>This section describes the recommended  values of BFD control packet fields in the network device interconnection authentication case.</t>
      <t><xref target="RFC5880"/> defines BFD control packet format which is shown in figure1.</t>
      <figure anchor="ref-to-fig1">
        <name>BFD control packet format</name>
        <artwork><![CDATA[
0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Vers |  Diag   |Sta|P|F|C|A|D|M|  Detect Mult  |    Length     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       My Discriminator                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                      Your Discriminator                       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Desired Min TX Interval                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                   Required Min RX Interval                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                 Required Min Echo RX Interval                 |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>A(Authentication Present): In this document, the value should be set to 1 in the initialization phase. In the keepalive phase, the value of this field on the peer end is not checked.</t>
      <t>D(Demand): In this document, it should be set to 0, indicating the asynchronous mode.</t>
      <t>M(Multipoint): In this document, it should be set to 0. Point-to-multipoint scenario is not considered.</t>
      <t>Required Min Echo RX Interval: This document does not involve the echo packet mode. this field should set to 0.</t>
      <t>The other fields of BFD control packet comply with <xref target="RFC5880"/>.</t>
      <section anchor="authentication-section-format">
        <name>Authentication Section Format</name>
        <t><xref target="RFC5880"/> defines 5 types of Authentication section, the detail can be seen in clause 4.4 of <xref target="RFC5880"/> . This document recommends Meticulous Keyed SHA1 Authentication section as it has the highest security.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>These extensions to BFD do not add any new security issues to the existing protocol.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5880" target="https://www.rfc-editor.org/info/rfc5880" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5880.xml">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency. It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5880"/>
        <seriesInfo name="DOI" value="10.17487/RFC5880"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC5881" target="https://www.rfc-editor.org/info/rfc5881" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5881.xml">
        <front>
          <title>Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes the use of the Bidirectional Forwarding Detection (BFD) protocol over IPv4 and IPv6 for single IP hops. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5881"/>
        <seriesInfo name="DOI" value="10.17487/RFC5881"/>
      </reference>
    </references>
    <?line 171?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
