{"draft":"draft-ietf-opsec-routing-protocols-crypto-issues-07","doc_id":"RFC6039","title":"Issues with Existing Cryptographic Protection Methods for Routing Protocols","authors":["V. Manral","M. Bhatia","J. Jaeggli","R. White"],"format":["ASCII","HTML"],"page_count":"21","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Operational Security Capabilities for IP Network Infrastructure","abstract":"Routing protocols have been extended over time to use cryptographic\r\nmechanisms to ensure that data received from a neighboring router\r\nhas not been modified in transit and actually originated from an\r\nauthorized neighboring router.\r\n\r\nThe cryptographic mechanisms defined to date and described in this\r\ndocument rely on a digest produced with a hash algorithm applied to\r\nthe payload encapsulated in the routing protocol packet.\r\n\r\nThis document outlines some of the limitations of the current\r\nmechanism, problems with manual keying of these cryptographic\r\nalgorithms, and possible vectors for the exploitation of these\r\nlimitations. This document is not an Internet Standards Track \r\nspecification; it is published for informational purposes.","pub_date":"October 2010","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6039","errata_url":null}