[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
New draft -- IPSEC AH
Network Working Group Stephen Kent, BBN Corp
Internet Draft Randall Atkinson, @Home Network
draft-ietf-ipsec-auth-05.txt 30 May 1997
IP Authentication Header
Status of This Memo
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas,
and its Working Groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of 6 months.
Internet Drafts may be updated, replaced, or obsoleted by other
documents at any time. It is not appropriate to use Internet Drafts
as reference material or to cite them other than as a "working draft"
or "work in progress". Please check the I-D abstract listing
contained in each Internet Draft directory to learn the current
status of this or any other Internet Draft.
This particular Internet Draft is a product of the IETF's IPsec
Working Group. It is intended that a future version of this draft
will be submitted for consideration as a standards-track document.
Distribution of this document is unlimited.
Kent, Atkinson [Page 1]
Internet Draft IP Authentication Header 30 May, 1997
Table of Contents
1. Introduction......................................................3
2. Authentication Header Format......................................4
2.1 Next Header...................................................4
2.2 Payload Length................................................4
2.3 Reserved......................................................4
2.4 Security Parameters Index (SPI)...............................5
2.5 Sequence Number...............................................5
2.6 Authentication Data ..........................................5
3. Authentication Header Processing..................................6
3.1 Authentication Header Location...............................6
3.2 Outbound Packet Processing...................................8
3.2.1 Security Association Lookup.............................8
3.2.2 Sequence Number Generation..............................8
3.2.3 Integrity Check Value Calculation.......................8
3.2.3.1 Handling Mutable Fields............................8
3.2.3.1.1 ICV Computation for IPv4......................9
3.2.3.1.2 ICV Computation for IPv6......................9
3.2.3.2 Padding...........................................10
3.2.3.2.1 Authentication Data Padding..................10
3.2.3.2.2 Implicit Packet Padding......................10
3.2.3.3 Authentication Algorithms.........................11
3.2.4 Fragmentation..........................................11
3.3 Inbound Packet Processing...................................11
3.3.1 Reassembly.............................................11
3.3.2 Security Association Lookup............................11
3.3.3 Sequence Number Verification...........................12
3.3.4 Integrity Check Value Verification.....................13
4. Auditing.........................................................13
5. Conformance Requirements.........................................14
6. Security Considerations..........................................14
7. Differences from RFC 1826........................................14
Acknowledgements....................................................15
References..........................................................15
Disclaimer..........................................................16
Author Information..................................................17
Kent, Atkinson [Page 2]
Internet Draft IP Authentication Header 30 May, 1997
1. Introduction
The IP Authentication Header (AH) is used to provide connectionless
integrity and data origin authentication for IP datagrams (hereafter
referred to as just "authentication"), and to provide protection
against replays. This latter, optional service may be selected, by
the receiver, when a Security Association is established. AH
provides authentication for as much of the IP header as possible, as
well as for upper level protocol data. However, some IP header
fields may change in transit and the value of these fields, when the
packet arrives at the receiver, may not be predictable by the
transmitter. The values of such fields cannot be protected by AH.
Thus the protection provided to the IP header by AH is somewhat
piecemeal.
AH may be applied alone, in combination with the IP Encapsulating
Security Payload (ESP) [KA97b], or in a nested fashion through the
use of tunnel mode (see below). Security services can be provided
between a pair of communicating hosts, between a pair of
communicating security gateways, or between a security gateway and a
host. ESP may be used to provide the same security services, and it
also provides a confidentiality (encryption) service. The primary
difference between the authentication provided by ESP and AH is the
extent of the coverage. Specifically, ESP does not protect any IP
header fields unless those fields are encapsulated by ESP (tunnel
mode). For more details on how to use AH and ESP in various network
environments, see "Security Architecture for the Internet Protocol"
[KA97a] (hereafter referred to as the "Security Architecture").
It is assumed that the reader is familiar with the terms and concepts
described in the Security Architecture document. In particular, the
reader should be familiar with the definitions of security services
offered by AH (and by ESP), the concept of Security Associations, the
different key management options available for AH (and ESP), and the
ways in which AH can be used in conjunction with ESP.
Kent, Atkinson [Page 3]
Internet Draft IP Authentication Header 30 May, 1997
2. Authentication Header Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Payload Len | RESERVED |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Security Parameters Index (SPI) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number Field |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Authentication Data (variable) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The following subsections define the fields that comprise the AH
format. All the fields described here are mandatory, i.e., they are
always present in the AH format and are included in the ICV
computation.
2.1 Next Header
The Next Header is an 8-bit field that identifies the type of the
next payload after the Authentication Header. The value of this
field is chosen from the set of IP Protocol Numbers defined in the
most recent "Assigned Numbers" [STD-2] RFC from the Internet Assigned
Numbers Authority (IANA).
2.2 Payload Length
This 8-bit field specifies the length of AH, in 32-bit words (4-byte
units), minus "2," i.e., the fixed portion (as defined in the
original AH spec) of AH is not counted. (Since the Sequence Number
field is always present, the fixed portion of AH is now three 32-bit
words. However, the "minus 2" length adjustment has been retained
for backwards compatibility.) A "null" authentication algorithm may
be used only for debugging purposes. Its use would result in a "0"
value for this field, as there would be no corresponding
Authentication Data field.
2.3 Reserved
This 16-bit field is reserved for future use. It MUST be set to
"zero." (Note that the value is included in the Authentication Data
calculation, but is otherwise ignored by the recipient.)
Kent, Atkinson [Page 4]
Internet Draft IP Authentication Header 30 May, 1997
2.4 Security Parameters Index (SPI)
The SPI is an arbitrary 32-bit value that uniquely identifies the
Security Association for this datagram, relative to the destination
IP address contained in the IP header with which this security header
is associated, and relative to the security protocol employed. The
set of SPI values in the range 1 through 255 are reserved by the
Internet Assigned Numbers Authority (IANA) for future use; a reserved
SPI value will not normally be assigned by IANA unless the use of the
assigned SPI value is specified in an RFC. It is ordinarily selected
by the destination system upon establishment of an SA (see the
Security Architecture document for more details). (A zero value may
be used for local debugging purposes, but no AH packets should be
transmitted with a zero SPI value.)
2.5 Sequence Number
This unsigned 32-bit field contains a monotonically increasing
counter value (sequence number). The counter is initialized to 1
when an SA is established. The sequence number must never be allowed
to cycle; thus, it MUST be reset (by establishing a new SA and thus a
new key) prior to the transmission of 2^32-1 packets on an SA.
This field is always present, even if the receiver does not elect to
enable the anti-replay service for a specific SA, in order to ensure
8-byte alignment for the IPv6 environment, when the default integrity
algorithms are employed.
Processing of the Sequence Number field is at the discretion of the
receiver, i.e., the sender MUST always transmit this field, but the
receiver need not act upon it (see the discussion of Sequence Number
Verification in the "Inbound Processing" section below).
2.6 Authentication Data
This is a variable-length field that contains the Integrity Check
Value (ICV) for this packet. The field must be an integral multiple
of 32 bits in length. The details of the ICV computation are
described in Section 3.2.3 below. This field may include explicit
padding. This padding is included to ensure that the length of the
AH header is an integral multiple of 32 bits (IPv4) or 64 bits
(IPv6). All implementations MUST support such padding. Details of
how to compute the required padding length are provided below.
Kent, Atkinson [Page 5]
Internet Draft IP Authentication Header 30 May, 1997
3. Authentication Header Processing
3.1 Authentication Header Location
Like ESP, AH may be employed in two ways: transport mode or tunnel
mode. The former mode is applicable only to host implementations and
provides protection for upper layer protocols, in addition to
selected IP header fields. (In this mode, note that for "bump-in-
the-stack" or "bump-in-the-wire" implementations, as defined in the
Security Architecture document, inbound and outbound IP fragments may
require an IPsec implementation to perform extra IP
reassembly/fragmentation in order to both conform to this
specification and provide transparent IPsec support. Special care is
required to perform such operations within these implementations when
multiple interfaces are in use.)
In transport mode, AH is inserted after the IP header and before an
upper layer protocol, e.g., TCP, UDP, ICMP, etc. In the context of
IPv4, this calls for placing AH after the IP header (and any options
that it contains), but before the upper layer protocol. (Note that
the term "transport" mode should not be misconstrued as restricting
its use to TCP and UDP. For example, an ICMP message MAY be sent
using either "transport" mode or "tunnel" mode.) The following
diagram illustrates AH transport mode positioning for a typical IPv4
packet, on a "before and after" basis.
BEFORE APPLYING AH
----------------------------
IPv4 |orig IP hdr | | |
|(any options)| TCP | Data |
----------------------------
AFTER APPLYING AH
---------------------------------
IPv4 |orig IP hdr | | | |
|(any options)| AH | TCP | Data |
---------------------------------
|<------- authenticated ------->|
except for mutable fields
In the IPv6 context, AH is viewed as an end-to-end payload, and thus
should appear after hop-by-hop, routing, and fragmentation extension
headers. The destination options extension header(s) could appear
either before or after the AH header depending on the semantics
desired. The following diagram illustrates AH transport mode
positioning for a typical IPv6 packet.
Kent, Atkinson [Page 6]
Internet Draft IP Authentication Header 30 May, 1997
BEFORE APPLYING AH
---------------------------------------
IPv6 | | ext hdrs | | |
| orig IP hdr |if present| TCP | Data |
---------------------------------------
AFTER APPLYING AH
------------------------------------------------------------
IPv6 | |hxh,rtg,frag| dest | | dest | | |
|orig IP hdr |if present**| opt* | AH | opt* | TCP | Data |
------------------------------------------------------------
|<---- authenticated except for mutable fields ----------->|
* = if present, could be before AH, after AH, or both
** = hop by hop, routing, fragmentation headers
Tunnel mode AH may be employed in either hosts or security gateways
(or in so-called "bump-in-the-stack" or "bump-in-the-wire"
implementations, as defined in the Security Architecture document).
When AH is implemented in a security gateway (to protect subscriber
transit traffic), tunnel mode must be used. In tunnel mode, the
"inner" IP header carries the ultimate source and destination
addresses, while an "outer" IP header may contain distinct IP
addresses, e.g., addresses of security gateways. In tunnel mode, AH
protects the entire inner IP packet, including the entire inner IP
header. The position of AH in tunnel mode, relative to the outer IP
header, is the same as for AH in transport mode. The following
diagram illustrates AH tunnel mode positioning for typical IPv4 and
IPv6 packets.
------------------------------------------------
IPv4 | new IP hdr* | | orig IP hdr* | | |
|(any options)| AH | (any options) |TCP | Data |
------------------------------------------------
|<-- authenticated except for mutable fields ->|
--------------------------------------------------------------
IPv6 | | ext hdrs*| | | ext hdrs*| | |
|new IP hdr*|if present| AH |orig IP hdr*|if present|TCP|Data|
--------------------------------------------------------------
|<-------- authenticated except for mutable fields --------->|
* = construction of outer IP hdr/extensions and modification
of inner IP hdr/extensions is discussed below.
Kent, Atkinson [Page 7]
Internet Draft IP Authentication Header 30 May, 1997
3.2 Outbound Packet Processing
In transport mode, the transmitter inserts the AH header after the IP
header and before an upper layer protocol header, as described above.
In tunnel mode, the outer and inner IP header/extensions can be
inter-related in a variety of ways. The construction of the outer IP
header/extensions during the encapsulation process is described in
the Security Architecture document.
3.2.1 Security Association Lookup
AH is applied to an outbound packet only after an IPsec
implementation determines that the packet is associated with an SA
that calls for AH processing. The process of determining what, if
any, IPsec processing is applied to outbound traffic is described in
the Security Architecture document.
3.2.2 Sequence Number Generation
The transmitter increments the Sequence Number for this SA, checks to
ensure that the counter has not cycled, and inserts the new value
into the Sequence Number Field. A transmitter MUST not send a packet
on an SA if doing so would cause the sequence number to cycle. An
attempt to transmit a packet that would result in sequence number
overflow is an auditable event.
3.2.3 Integrity Check Value Calculation
3.2.3.1 Handling Mutable Fields
The AH ICV is computed over IP header fields that are either
immutable in transit or that are predictable in value upon arrival at
the endpoint for the AH SA. The ICV also encompasses the upper level
protocol data, which is assumed to be immutable in transit. If a
field is modified during transit, the value of the field is set to
zero for purposes of the ICV computation. If a field is mutable, but
its value at the (IPsec) receiver is predictable, then that value is
inserted into the field for purposes of the ICV calculation. The
Authentication Data field also is set to zero in preparation for this
computation. (Note that by replacing each field's value with zero,
rather than omitting the field, alignment is preserved for the ICV
calculation.)
DISCUSSION:
For IPv4 (unlike IPv6), there is no mechanism for tagging options
as mutable in transit. Hence the IPv4 options are explicitly
listed here and classified as either mutable or immutable. For
Kent, Atkinson [Page 8]
Internet Draft IP Authentication Header 30 May, 1997
IPv4, the entire option is viewed as a unit; so even though the
type and length fields within most options are immutable in
transit, if an option is classified as mutable, the entire option
is zeroed for ICV computation purposes. The mutable IPv4 header
fields also are enumerated below. The ICV calculation is
restricted to the immutable options and specified (base) header
fields.
3.2.3.1.1 ICV Computation for IPv4
The following IPv4 base header fields are zeroed prior to the
computation of the ICV:
- Time to Live (TTL)
- Header Checksum
- Offset
- Flags
- Type of Service (TOS)
TTL is changed en-route as a normal course of processing by routers,
and thus its value at the receiver is not predictable by the sender.
The TOS field is excluded because some routers are known to change
the value of this field, even though the IP specification does not
consider TOS to be a mutable header field. Since AH is applied only
to non-fragmented IP packets, the Offset Field must always be zero,
and thus it is excluded (even though it is predictable). The Flags
field is excluded since an intermediate router might set the DF bit,
even if the source did not select it. Finally, the Header Checksum
will change if any of these other fields changes, and thus its value
upon reception cannot be predicted by the sender.
The following IPv4 options are mutable: record route, timestamp,
loose source routing, and strict source routing. These options are
treated as zero-filled for purposes of the ICV computation. The IP
Security Options, BSO and ESO (RFC-1038, RFC-1108) and the CIPSO
(option number 134) option are included in the ICV calculation and
are not zeroed.
3.2.3.1.2 ICV Computation for IPv6
In IPv6, the "Hop Limit" field in the IPv6 base header is zeroed
prior to performing the ICV calculation. IPv6 options contain a bit
that indicates whether the option might change (unpredictably) during
transit. For any option for which contents may change en-route, the
entire "Option Data" field must be treated as zero-valued octets when
computing or verifying the ICV. The Option Type and Opt Data Len are
included in the ICV calculation. All other options are also included
Kent, Atkinson [Page 9]
Internet Draft IP Authentication Header 30 May, 1997
in the ICV calculation. See the IPv6 specification [DH95] for more
information.
Note, for example, that the IPv6 Routing Header "Type 0" will
rearrange the address fields within the packet during transit from
source to destination. However, the contents of the packet as it
will appear at the receiver are known to the sender and to all
intermediate hops. Hence, the IPv6 Routing Header "Type 0" is
included in the Authentication Data calculation as an immutable
option. The transmitter must order the field so that it appears as
it will at the receiver, prior to performing the ICV computation.
3.2.3.2 Padding
3.2.3.2.1 Authentication Data Padding
As mentioned in section 2.6, the Authentication Data field explicitly
includes padding to ensure that the AH header is a multiple of 32
bits (IPv4) or 64 bits (IPv6). If padding is required, its length is
determined by two factors:
- the length of the ICV
- the IP protocol context (v4 or v6)
For example, if a default, 96-bit truncated HMAC algorithm is
selected, no padding is required for either IPv4 nor for IPv6.
However, if a different length ICV is generated, due to use of a
different algorithm, then padding may be required for the IPv6
environment. The content of the padding field is arbitrarily
selected by the sender. (The padding is arbitrary, but need not be
random to achieve security.) These bytes are included in the
Authentication Data calculation, counted as part of the Payload
Length, and transmitted at the end of the Authentication Data field
to enable the receiver to perform the ICV calculation.
3.2.3.2.2 Implicit Packet Padding
For some authentication algorithms, the byte string over which the
ICV computation is performed must be a multiple of a blocksize
specified by the algorithm. If the IP packet length (including AH)
does not match the blocksize requirements for the algorithm, implicit
padding MUST be appended to the end of the packet, prior to ICV
computation. The padding octets MUST have a value of zero. The
blocksize (and hence the length of the padding) is specified by the
algorithm specification. This padding is not transmitted with the
packet.
Kent, Atkinson [Page 10]
Internet Draft IP Authentication Header 30 May, 1997
3.2.3.3 Authentication Algorithms
The authentication algorithm employed for the ICV computation is
specified by the SA. For point-to-point communication, suitable
authentication algorithms include keyed Message Authentication Codes
(MACs) based on symmetric encryption algorithms (e.g., DES) or on
one-way hash functions (e.g., MD5 or SHA-1). For multicast
communication, one-way hash algorithms combined with asymmetric
signature algorithms are appropriate, though performance and space
considerations usually preclude use of such algorithms. As of this
writing, the mandatory-to-implement authentication algorithms are
based on the former class, i.e., HMAC [KBC97] with SHA-1 [SHA] or
HMAC with MD5 [Riv92]. The output of the HMAC computation is
truncated to (the leftmost) 96 bits. Other algorithms, possibly with
different ICV lengths, MAY be supported.
3.2.4 Fragmentation
If required, IP fragmentation occurs after AH processing within an
IPsec implementation. Thus, transport mode AH is applied only to
whole IP datagrams (not to IP fragments). An IP packet to which AH
has been applied may itself be fragmented by routers en route, and
such fragments must be reassembled prior to AH processing at a
receiver. In tunnel mode, AH is applied to an IP packet, the payload
of which may be a fragmented IP packet. For example, a security
gateway or a "bump-in-the-stack" or "bump-in-the-wire" IPsec
implementation (see the Security Architecture document for details)
may apply tunnel mode AH to such fragments.
3.3 Inbound Packet Processing
3.3.1 Reassembly
If required, reassembly is performed prior to AH processing. If a
packet offered to AH for processing appears to be an IP fragment,
e.g., the OFFSET field is non-zero, the receiver MUST discard the
packet; this is an auditable event. The audit log entry for this
event SHOULD include the SPI value, date/time, Source Address,
Destination Address, and (in IPv6) the Flow ID.
3.3.2 Security Association Lookup
Upon receipt of a packet containing an IP Authentication Header, the
receiver determines the appropriate (unidirectional) SA, based on the
destination IP address and the SPI. (This process is described in
more detail in the Security Architecture document.) The SA dictates
whether the Sequence Number field will be checked, specifies the
algorithm(s) employed for ICV computation, and indicates the key(s)
Kent, Atkinson [Page 11]
Internet Draft IP Authentication Header 30 May, 1997
required to validate the ICV.
If no valid Security Association exists for this session (e.g., the
receiver has no key), the receiver MUST discard the packet; this is
an auditable event. The audit log entry for this event SHOULD
include the SPI value, date/time, Source Address, Destination
Address, and (in IPv6) the Flow ID.
3.3.3 Sequence Number Verification
All AH implementations MUST support the anti-replay service, though
its use may be enabled or disabled on a per-SA basis. (Note that
there are no provisions for managing transmitted Sequence Number
values among multiple senders directing traffic to a single,
multicast SA. Thus the anti-replay service SHOULD NOT be used in a
multi-sender multicast environment that employs a single, multicast
SA.) If an SA establishment protocol such as Oakley/ISAKMP is
employed, then the receiver SHOULD notify the transmitter, during SA
establishment, if the receiver will provide anti-replay protection
and SHOULD inform the transmitter of the window size.
If the receiver has enabled the anti-replay service for this SA, the
receiver packet counter for the SA MUST be initialized to zero when
the SA is established. For each received packet, the receiver MUST
verify that the packet contains a Sequence Number that does not
duplicate the Sequence Number of any other packets received during
the life of this SA. This SHOULD be the first AH check applied to a
packet after it has been matched to an SA, to speed rejection of
duplicate packets.
Duplicates are rejected through the use of a sliding receive window.
(How the window is implemented is a local matter, but the following
text describes the functionality that the implementation must
exhibit.) The default window size is 32 and all AH implementations
MUST support this window size. A larger window size MAY be
established during SA negotiation. If a larger window size is
negotiated it MUST be a multiple of 32.
The "right" edge of the window represents the highest, validated
Sequence Number value received on this SA. Packets that contain
Sequence Numbers lower than the "left" edge of the window are
rejected. Packets falling within the window are checked against a
list of received packets within the window. An efficient means for
performing this check, based on the use of a bit mask, is described
in the Security Architecture document.
If the received packet falls within the window and is new, or if the
packet is to the right of the window, then the receiver proceeds to
Kent, Atkinson [Page 12]
Internet Draft IP Authentication Header 30 May, 1997
ICV verification. If the ICV validation fails, the receiver MUST
discard the received IP datagram as invalid; this is an auditable
event. The audit log entry for this event SHOULD include the SPI
value, date/time, Source Address, Destination Address, the Sequence
Number, and (in IPv6) the Flow ID. The receive window is updated
only if the ICV verification succeeds.
DISCUSSION:
Note that if the packet is either inside the window and new, or is
outside the window on the "right" side, the receiver MUST
authenticate the packet before updating the Sequence Number window
data.
3.3.4 Integrity Check Value Verification
The receiver computes the ICV over the appropriate fields of the
packet, using the specified authentication algorithm, and verifies
that it is the same as the ICV included in the Authentication Data
field of the packet. Details of the computation are provided below.
If the computed and received ICV's match, then the datagram is valid,
and it is accepted. If the test fails, then the receiver MUST
discard the received IP datagram as invalid; this is an auditable
event. The audit log entry SHOULD include the SPI value, date/time,
Source Address, Destination Address, and (in IPv6) the Flow ID.
DISCUSSION:
Begin by saving the ICV value and replacing it (but not any
Authentication Data padding) with zero. Zero all other fields
that may have been modified during transit. (See section 3.2.3.1
for a discussion of which fields are zeroed before performing the
ICV calculation.) Check the overall length of the packet, and if
it requires implicit padding based on the requirements of the
authentication algorithm, append zero-filled bytes to the end of
the packet as required. Now perform the ICV computation and
compare the result with the received value. (If a digital
signature and one-way hash are used for the ICV computation, the
matching process is more complex and will be described in the
algorithm specification.)
4. Auditing
Not all systems that implement AH will implement auditing. However,
if AH is incorporated into a system that supports auditing, then the
Kent, Atkinson [Page 13]
Internet Draft IP Authentication Header 30 May, 1997
AH implementation MUST also support auditing and MUST allow a system
administrator to enable or disable auditing for AH. For the most
part, the granularity of auditing is a local matter. However,
several auditable events are identified in this specification and for
each of these events a minimum set of information that SHOULD be
included in an audit log is defined. Additional information also MAY
be included in the audit log for each of these events, and additional
events, not explicitly called out in this specification, also MAY
result in audit log entries. There is no requirement for the
receiver to transmit any message to the purported transmitter in
response to the detection of an auditable event, because of the
potential to induce denial of service via such action.
5. Conformance Requirements
Implementations that claim conformance or compliance with this
specification MUST fully implement the AH syntax and processing
described here and MUST comply with all requirements of the Security
Architecture document. If the key used to compute an ICV is manually
distributed, correct provision of the anti-replay service would
require correct maintenance of the counter state at the transmitter,
until the key is replaced, and there likely would be no automated
recovery provision if counter overflow were imminent. Thus a
compliant implementation SHOULD NOT provide this service in
conjunction with SAs that are manually keyed. A compliant AH
implementation MUST support the following mandatory-to-implement
algorithms (specified in [KBC97]):
- HMAC with MD5
- HMAC with SHA-1
6. Security Considerations
Security is central to the design of this protocol, and these
security considerations permeate the specification. Additional
security-relevant aspects of using the IPsec protocol are discussed
in the Security Architecture document.
7. Differences from RFC 1826
This specification of AH differs from RFC 1826 [ATK95] in several
important respects, but the fundamental features of AH remain intact.
One goal of the revision of RFC 1826 was to provide a complete
framework for AH, with ancillary RFCs required only for algorithm
specification. For example, the anti-replay service is now an
integral, mandatory part of AH, not a feature of a transform defined
in another RFC. Carriage of a sequence number to support this
Kent, Atkinson [Page 14]
Internet Draft IP Authentication Header 30 May, 1997
service is now required at all times, to meet IPv6 alignment
requirements (even when anti-replay is not enabled for an SA). The
default algorithms required for interoperability have been changed to
HMAC with MD5 or SHA-1 (vs. keyed MD5), for security reasons. The
list of IPv4 header fields excluded from the ICV computation has been
expanded to include the OFFSET and FLAGS fields.
Another motivation for revision was to provide additional detail and
clarification of subtle points. This specification provides
rationale for exclusion of selected IPv4 header fields from AH
coverage and provides examples on positioning of AH in both the IPv4
and v6 contexts. Auditing requirements have been clarified in this
version of the specification. Tunnel mode AH was mentioned only in
passing in RFC 1826, but now is a mandatory feature of AH.
Discussion of interactions with key management and with security
labels have been moved to the Security Architecture document.
Acknowledgements
For over 2 years, this document has evolved through multiple versions
and iterations. During this time, many people have contributed
significant ideas and energy to the process and the documents
themselves. The authors would like to thank the members of the IPsec
and IPng working groups, with special mention of the efforts of (in
alphabetic order): Steve Bellovin, Steve Deering, Francis Dupont,
Phil Karn, Frank Kastenholz, Perry Metzger, David Mihelcic, Hilarie
Orman, and William Simpson. In addition, Charlie Lynn, Karen Seo,
and Nina Yuan provided extensive help in the review and editing of
this version of the specification.
References
[ATK95] R. Atkinson, "The IP Authentication Header," RFC 1826,
August 1995.
[BCCH94] R. Braden, D. Clark, S. Crocker, & C.Huitema, "Report of
IAB Workshop on Security in the Internet Architecture",
RFC-1636, 9 June 1994, pp. 21-34.
[Bel89] Steven M. Bellovin, "Security Problems in the TCP/IP
Protocol Suite", ACM Computer Communications Review, Vol.
19, No. 2, March 1989.
[CER95] Computer Emergency Response Team (CERT), "IP Spoofing
Attacks and Hijacked Terminal Connections", CA-95:01,
January 1995. Available via anonymous ftp from
info.cert.org in /pub/cert_advisories.
Kent, Atkinson [Page 15]
Internet Draft IP Authentication Header 30 May, 1997
[DH95] Steve Deering & Bob Hinden, "Internet Protocol version 6
(IPv6) Specification", RFC-1883, December 1995.
[GM93] James Galvin & Keith McCloghrie, Security Protocols for
version 2 of the Simple Network Management Protocol
(SNMPv2), RFC-1446, April 1993.
[KA97a] Steve Kent, Randall Atkinson, "Security Architecture for
the Internet Protocol", Internet Draft, ?? 1997.
[KA97b] Steve Kent, Randall Atkinson, "IP Encapsulating Security
Payload (ESP)", Internet Draft, ?? 1997.
[KA97c] Steve Kent, Randall Atkinson, "IP Authentication Header",
Internet Draft, ?? 1997.
[KBC97] Hugo Krawczyk, Mihir Bellare, and Ran Canetti, "HMAC:
Keyed-Hashing for Message Authentication", RFC-2104,
February 1997.
[Ken91] Steve Kent, "US DoD Security Options for the Internet
Protocol", RFC-1108, November 1991.
[KA97a] Steve Kent, Randall Atkinson, "Security Architecture for
the Internet Protocol", Internet Draft, ?? 1997.
[Riv92] Ronald Rivest, "The MD5 Message Digest Algorithm," RFC-
1321, April 1992.
[SHA] NIST, FIPS PUB 180-1: Secure Hash Standard, April 1995
[STD-1] J. Postel, "Internet Official Protocol Standards", STD-1,
March 1996.
[STD-2] J. Reynolds & J. Postel, "Assigned Numbers", STD-2, 20
October 1994.
Disclaimer
The views and specification here are those of the authors and are not
necessarily those of their employers. The authors and their
employers specifically disclaim responsibility for any problems
arising from correct or incorrect implementation or use of this
specification.
Kent, Atkinson [Page 16]
Internet Draft IP Authentication Header 30 May, 1997
Author Information
Stephen Kent
BBN Corporation
70 Fawcett Street
Cambridge, MA 02140
USA
E-mail: kent@bbn.com
Telephone: +1 (617) 873-3988
Randall Atkinson
@Home Network
385 Ravendale Drive
Mountain View, CA 94043
USA
E-mail: rja@inet.org
Kent, Atkinson [Page 17]
Follow-Ups: