Check: CACI-RT-000024
Cisco ACI Router STIG:
CACI-RT-000024
(in version v1 r0.1)
Title
The Cisco ACI must be configured to use keys with a duration of 180 days or less for authenticating routing protocol messages. (Cat II impact)
Discussion
If the keys used for routing protocol authentication are guessed, the malicious user could create havoc within the network by advertising incorrect routes and redirecting traffic. Some routing protocols allow the use of key chains for authentication. A key chain is a set of keys that is used in succession, with each having a lifetime of no more than 180 days. Changing the keys frequently reduces the risk of them eventually being guessed. Keys cannot be used during time periods for which they are not activated. If a time period occurs during which no key is activated, neighbor authentication cannot occur, and therefore routing updates will fail. Therefore, ensure that for a given key chain, key activation times overlap to avoid any period of time during which no key is activated.
Check Content
If any key has a lifetime of more than 180 days (expressed in seconds), this is a finding. Review the switch configuration using the show bgp and show ospf commands to view BGP and OSPF. The configuration will be similar to the example below. Key-Chain bgp_keys tcp Key 1 -- text 0 "070e234f" send lifetime 3600 recv-lifetime 3600 If any key has a lifetime of 180 days or less, this is a finding.
Fix Text
For each authenticated routing protocol session, configure each key to have a lifetime of no more than 180 days. The following is an example. Step 1: Add the lifetime duration value to every TCP-AO Key ID configured. apic1(config)# ip tcp ao key chain <KEY_CHAIN_NAME> apic1(config)# key <KEY-ID> apic1(config-tcpkey chain-tcpkey)# send-lifetime <value in seconds> apic1(config-tcpkey chain-tcpkey)# recv-lifetime <value in seconds>
Additional Identifiers
Rule ID: SV-272084r1064487_rule
Vulnerability ID: V-272084
Group Title: SRG-NET-000230-RTR-000003
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001184 |
Protect the authenticity of communications sessions. |
Controls
Number | Title |
---|---|
SC-23 |
Session Authenticity |