Keychain Authentication

TCP enhanced authentication uses keychains that are associated with every protected TCP connection.

The keychain concept supported by BGP and LDP has also been extended to the OSPF, IS-IS, and RSVP-TE protocols.

The keychain mechanism allows for the creation of keys used to authenticate protocol communications. Each keychain entry defines the authentication attributes to be used in authenticating protocol messages from remote peers or neighbors; the keychain must include at least one key entry to be valid. The keychain mechanism also allows authentication keys to be changed without affecting the state of the associated protocol adjacencies.

Each key within a keychain must include the following attributes for the authentication of protocol messages:

Optionally, each key can include the following attributes:

For added security, support for the Secure Hash Algorithm (SHA) has been added. Table: Security Algorithm Support Per Protocol lists the security algorithms supported per protocol.

Table: Security Algorithm Support Per Protocol

Protocol

Clear Text

MD5

(message digest)

HMAC-MD5

HMAC-SHA-1-96

HMAC-SHA-1

HMAC-SHA-256

AES-128-CMAC-96

OSPF

Yes

Yes

No

Yes

Yes

Yes

No

IS-IS

Yes

No

Yes

No

Yes

Yes

No

RSVP-TE

No

No

Yes

Yes

Yes

Yes

No

BGP

No

No

No

Yes

No

No

Yes

LDP

No

No

No

Yes

No

No

Yes