refresh [keep] <num>;
retry [keep] <num>;
expire [keep] <num>;
- transport tcp;
+ transport tcp {
+ authentication none|md5;
+ password "<text>";
+ };
transport ssh {
bird private key "</path/to/id_rsa>";
remote public key "</path/to/known_host>";
instead. This may be useful for implementing loose RPKI check for
blackholes. Default: disabled.
- <tag>transport tcp</tag> Unprotected transport over TCP. It's a default
- transport. Should be used only on secure private networks.
- Default: tcp
+ <tag>transport tcp { <m/TCP transport options.../ }</tag> Transport over
+ TCP, it's the default transport. Cannot be combined with a SSH transport.
+ Default: TCP, no authentication.
<tag>transport ssh { <m/SSH transport options.../ }</tag> It enables a
SSHv2 transport encryption. Cannot be combined with a TCP transport.
Default: off
</descrip>
+<sect3>TCP transport options
+<p>
+<descrip>
+ <tag>authentication none|md5</tag>
+ Select authentication method to be used. <cf/none/ means no
+ authentication, <cf/md5/ is TCP-MD5 authentication (<rfc id="2385">).
+ Default: no authentication.
+
+ <tag>password "<m>text</m>"</tag>
+ Use this password for TCP-MD5 authentication of the RPKI-To-Router session.
+</descrip>
+
<sect3>SSH transport options
<p>
<descrip>
CF_DEFINES
#define RPKI_CFG ((struct rpki_config *) this_proto)
+#define RPKI_TR_TCP_CFG ((struct rpki_tr_tcp_config *) RPKI_CFG->tr_config.spec)
#define RPKI_TR_SSH_CFG ((struct rpki_tr_ssh_config *) RPKI_CFG->tr_config.spec)
static void
CF_DECLS
CF_KEYWORDS(RPKI, REMOTE, BIRD, PRIVATE, PUBLIC, KEY, TCP, SSH, TRANSPORT, USER,
- RETRY, REFRESH, EXPIRE, KEEP, IGNORE, MAX, LENGTH, LOCAL, ADDRESS)
+ RETRY, REFRESH, EXPIRE, KEEP, IGNORE, MAX, LENGTH, LOCAL, ADDRESS,
+ AUTHENTICATION, NONE, MD5, PASSWORD)
%type <i> rpki_keep_interval
};
rpki_transport:
- TCP rpki_transport_tcp_init
+ TCP rpki_transport_tcp_init rpki_transport_tcp_opts_list rpki_transport_tcp_check
| SSH rpki_transport_ssh_init '{' rpki_transport_ssh_opts '}' rpki_transport_ssh_check
;
RPKI_CFG->tr_config.type = RPKI_TR_TCP;
};
+rpki_transport_tcp_opts_list:
+ /* empty */
+ | '{' rpki_transport_tcp_opts '}'
+ ;
+
+rpki_transport_tcp_opts:
+ /* empty */
+ | rpki_transport_tcp_opts rpki_transport_tcp_item ';'
+ ;
+
+rpki_transport_tcp_item:
+ AUTHENTICATION NONE { RPKI_TR_TCP_CFG->auth_type = RPKI_TCP_AUTH_NONE; }
+ | AUTHENTICATION MD5 { RPKI_TR_TCP_CFG->auth_type = RPKI_TCP_AUTH_MD5; }
+ | PASSWORD text { RPKI_TR_TCP_CFG->password = $2; }
+ ;
+
+rpki_transport_tcp_check:
+{
+ if (!RPKI_TR_TCP_CFG->auth_type != !RPKI_TR_TCP_CFG->password)
+ cf_error("Authentication and password options should be used together");
+};
+
rpki_transport_ssh_init:
{
#if HAVE_LIBSSH
try_reset = 1;
}
+ if (new->tr_config.type == RPKI_TR_TCP)
+ {
+ struct rpki_tr_tcp_config *tcp_old = (void *) old->tr_config.spec;
+ struct rpki_tr_tcp_config *tcp_new = (void *) new->tr_config.spec;
+
+ if (tcp_old->auth_type != tcp_new->auth_type)
+ {
+ CACHE_TRACE(D_EVENTS, cache, "Authentication type changed");
+ return NEED_RESTART;
+ }
+
+ if (bstrcmp(tcp_old->password, tcp_new->password))
+ {
+ CACHE_TRACE(D_EVENTS, cache, "MD5 password changed");
+ return NEED_RESTART;
+ }
+ }
+
#if HAVE_LIBSSH
else if (new->tr_config.type == RPKI_TR_SSH)
{
default_port = RPKI_SSH_PORT;
break;
#endif
- case RPKI_TR_TCP:
- transport_name = "Unprotected over TCP";
+ case RPKI_TR_TCP:;
+ struct rpki_tr_tcp_config *tcp_cf = (void *) cf->tr_config.spec;
+ if (tcp_cf->auth_type == RPKI_TCP_AUTH_MD5)
+ transport_name = "TCP-MD5";
+ else
+ transport_name = "Unprotected over TCP";
default_port = RPKI_TCP_PORT;
break;
};
static int
rpki_tr_tcp_open(struct rpki_tr_sock *tr)
{
+ struct rpki_cache *cache = tr->cache;
+ struct rpki_config *cf = (void *) cache->p->p.cf;
+ struct rpki_tr_tcp_config *tcp_cf = (void *) cf->tr_config.spec;
sock *sk = tr->sk;
sk->type = SK_TCP_ACTIVE;
+ if (tcp_cf->auth_type == RPKI_TCP_AUTH_MD5)
+ sk->password = tcp_cf->password;
+
if (sk_open(sk) != 0)
return RPKI_TR_ERROR;
#endif
};
+/* TCP authentication types */
+enum rpki_tcp_auth {
+ RPKI_TCP_AUTH_NONE,
+ RPKI_TCP_AUTH_MD5
+};
+
/* Common configure structure for transports */
struct rpki_tr_config {
enum rpki_tr_type type; /* RPKI_TR_TCP or RPKI_TR_SSH */
};
struct rpki_tr_tcp_config {
- /* No internal configuration data */
+ enum rpki_tcp_auth auth_type; /* Authentication type */
+ const char *password; /* Password used for authentication */
};
struct rpki_tr_ssh_config {