Hi Greg, The suggestion to authenticate every Nth frame came to us when we initially presented the draft. It was not part of the original draft. If I remember, the reason given was that if a MITM had taken over the session, then authenticating an occasional frame would help detect that. Note, however, a MITM cannot change the state of the session, because a change in the state of the session requires those frames to be authenticated by the sender, and for those frames to be marked valid by the receiver.
Cheers. > On Jul 2, 2018, at 11:06 AM, Greg Mirsky <gregimir...@gmail.com> wrote: > > Hi Mahesh, > you've said: > > If three or more frames are discarded because one or all three of them were > marked with NULL Auth TLV, and all of them fail authentication, the receiver > brings the session down. Again, this is no different from three or more > unauthenticated or meticulously authenticated frames being discarded, causing > the receiver to bring the session down. > > My understanding of periodic mode is that when the BFD session is in Up state > every Nth BFD Control packet is authenticated while rest of packets are not. > Consider the scenario when each authenticated packet fails validation while > unauthenticated packet pass. Would the state of the session remain Up? If so, > what is the purpose of authentication? If not, if the session transitions to > Down state, then it is, in my opinion, the change to BFD state machine per > RFC 5880. > > Regards, > Greg > > On Mon, Jul 2, 2018 at 9:58 AM, Mahesh Jethanandani <mjethanand...@gmail.com > <mailto:mjethanand...@gmail.com>> wrote: > Picking up on this thread. > > The way to look at this draft is, that it suggests which frames will undergo > authentication. This draft does not suggest any change to the state machine, > or believe it causes a change in it. Frames that need authentication will > carry the NULL Auth TLV. If they are not authenticated or do not need > authentication they will not have the TLV. > > If a BFD session is down, and it is going through a P/F sequence the frames > need to be authenticated, since these frames cause a state machine > transition. If authentication fails, frames are discarded and the session > remains down. This is no different from a unauthenticated or a meticulously > authenticated P/F frame getting discarded, keeping the session down. > > If the session is up, and it needs to be brought down, then the frame to > bring it down needs to be authenticated, again because these frames cause a > change in state machine. If it fails authentication, the frame is discarded > and the session remains up. Again, this is no different from a > unauthenticated frame or a meticulously authenticated frame being discarded, > keeping the session up. > > If three or more frames are discarded because one or all three of them were > marked with NULL Auth TLV, and all of them fail authentication, the receiver > brings the session down. Again, this is no different from three or more > unauthenticated or meticulously authenticated frames being discarded, causing > the receiver to bring the session down. > > Cheers. > >> On Apr 9, 2018, at 12:39 PM, Greg Mirsky <gregimir...@gmail.com >> <mailto:gregimir...@gmail.com>> wrote: >> >> Hi Ashesh, >> thank you for your response to my questions.. I think I need some more of >> your help to locate the text in RFC 5880 that, as you've stated, mandates >> that the single failure to authenticate a BFD control packet in Up state >> triggers the transition to Down state. I only see section 6.7 that describes >> authentication validation and when the received control packet must be >> discarded because of validation failure and the following text: >> If the A bit is set, the packet MUST be authenticated under the >> rules of section 6.7, based on the authentication type in use >> (bfd.AuthType). This may cause the packet to be discarded. >> But I don't find any text that states that if authentication is in use, then >> Detect Time calculated regardless of the value of the Detect Mult field. >> Perhaps I will extend the description of the scenario: >> authentication is in use and every, for example, the fourth packet to be >> authenticated, i.e. three control packets with NULL Auth TLV followed by >> "real" authenticated control packet; >> initial packets, three-way handshake, pass authentication verification and >> the session is Up; >> at some point, the verification of the "real" authenticated packets fails >> and it is discarded; >> packets with NUL Auth TLV pass the validation. >> Appreciate your consideration and help. >> >> Regards, >> Greg >> >> On Mon, Apr 9, 2018 at 10:51 AM, Ashesh Mishra <mishra.ash...@outlook.com >> <mailto:mishra.ash...@outlook.com>> wrote: >> Hi Greg, >> >> >> >> What I meant to say was that the state machine remains the same as in the >> case of 5880 authentication. If an authentication frame fails validation >> then the session goes down regardless of good OPER-UP frames (authentication >> or normal) before or after that frame. Since the behavior in 5880 does not >> require any more than 1 frame to fail validation, the mechanism works as-is >> in the new proposal. Once the session is down, all frames need to be >> authenticated to bring the session up so again, the session can’t come back >> up just because the frame that failed validation is followed by a stream of >> unauthenticated frames. >> >> >> >> Hope that addresses the gap that you presented. >> >> >> >> Ashesh >> >> >> >> From: Greg Mirsky <gregimir...@gmail..com <mailto:gregimir...@gmail.com>> >> >> >> Date: Tuesday, April 3, 2018 at 8:35 PM >> >> >> To: Ashesh Mishra <mishra.ash...@outlook.com >> <mailto:mishra.ash...@outlook.com>> >> Cc: Jeffrey Haas <jh...@pfrc.org <mailto:jh...@pfrc.org>>, "rtg-bfd@ietf.org >> <mailto:rtg-bfd@ietf.org>" <rtg-bfd@ietf.org <mailto:rtg-...@ietf..org>> >> Subject: Re: WGLC BFD Authentication Drafts >> >> >> >> Hi Asheh, <> >> thank you for the detailed response to my questions and consideration of my >> comments. >> >> I think I cannot agree that the BFD state machine remains unchanged if >> optimized BFD authentication is in periodic mode. Let's consider case when >> only every 5th BFD control packet is authenticated when the session is in Up >> state. What happens if from some moment every authenticated packet fails to >> be validated? Would the session go to Down state? But all unauthenticated >> BFD control packets pass the validation check and since only one packet >> seems to miss validation the session, if the state machine remains >> unchanged, will stay Up. >> >> >> >> Do you see this as plausible scenario? >> >> >> >> Regards, >> >> Greg >> >> >> >> On Tue, Apr 3, 2018 at 11:03 AM, Ashesh Mishra <mishra.ash...@outlook.com >> <mailto:mishra.ash...@outlook.com>> wrote: >> >> Thanks for the clarification, Greg. >> >> >> >> Here are my thoughts on the issues: >> >> >> >> I'd break it into couple more specific questions: >> >> · can the periodic Optimized Authentication mode be used without >> authorization o state changes; >> >> · if the answer to the previous question "yes", then when the first >> authorized BFD control packet must be transmitted by the system; >> >> · does the BFD state machine (section 6.2 RFC 5880) changes >> resulting from introduction of periodic optimized authentication mode; >> >> [AM] The optimized authentication can be used without state changes and the >> first auth packet will be the DOWN state frame to kick-off the session >> negotiation as the proposal suggests that all DOWN state frames are >> authenticated. The state machine does not change in this proposal but it >> only indicates which frames should be authenticated and which ones can use >> NULL-AUTH TLV (un-authenticated frames). >> >> And additional comments: >> >> · "For example, the two ends can decide that BFD frames that >> indicate a state change should be authenticated and enable authentication on >> those frames only." >> >> I don't think that nodes "decide" anything but are configured to do >> something. >> >> >> >> [AM] I agree that the language is not accurate. We’ll change it in the next >> revision. The intention is to use indicate configuration rather than >> negotiation. >> >> · "If the two ends have not previously negotiated which frames they >> will transmit or receive with authentication enabled ..." >> >> I couldn't find the negotiation procedure being described in the document. >> Is it out-of-band, i.e. by control or management plane, not part of this BFD >> enhancement? >> >> >> >> [AM] The language should indicate configuration instead of negotiation. >> >> · "The configuration of the periodic authentication interval for BFD >> CC UP frames is an open issue." >> >> I believe that this open issue must be resolved in the definitive manner >> before the draft moved to WGLC. >> >> >> >> [AM] This line should be removed and the preceding text should indicate that >> the parameters for authentication should be configured on the session >> end-points. >> >> >> >> Regards, >> Ashesh >> >> >> >> From: Greg Mirsky <gregimir...@gmail.com <mailto:gregimir...@gmail.com>> >> Date: Monday, April 2, 2018 at 12:34 PM >> To: Ashesh Mishra <mishra.ash...@outlook.com >> <mailto:mishra.ash...@outlook.com>> >> Cc: Jeffrey Haas <jh...@pfrc.org <mailto:jh...@pfrc.org>>, "rtg-bfd@ietf.org >> <mailto:rtg-bfd@ietf.org>" <rtg-bfd@ietf.org <mailto:rtg-bfd@ietf.org>> >> >> >> Subject: Re: WGLC BFD Authentication Drafts >> >> >> >> Hi Asheh, <> >> thank you for taking time to review the minutes from BFD WG meeting at >> IETF-98. I don't think that we had enough time to discuss in details my >> question: >> >> Greg Mirsky: One of the possible modes when the session is up is to use >> authentication with periodic timer trigger? >> >> I'd break it into couple more specific questions: >> >> can the periodic Optimized Authentication mode be used without authorization >> o state changes; >> if the answer to the previous question "yes", then when the first authorized >> BFD control packet must be transmitted by the system; >> does the BFD state machine (section 6.2 RFC 5880) changes resulting from >> introduction of periodic optimized authentication mode; >> And additional comments: >> >> "For example, the two ends can decide that BFD frames that indicate a state >> change should be authenticated and enable authentication on those frames >> only." >> I don't think that nodes "decide" anything but are configured to do >> something. >> >> "If the two ends have not previously negotiated which frames they will >> transmit or receive with authentication enabled ..." >> I couldn't find the negotiation procedure being described in the document. >> Is it out-of-band, i.e. by control or management plane, not part of this BFD >> enhancement? >> >> "The configuration of the periodic authentication interval for BFD CC UP >> frames is an open issue." >> I believe that this open issue must be resolved in the definitive manner >> before the draft moved to WGLC. >> >> >> >> Regards, >> >> Greg >> >> >> >> >> >> On Sun, Apr 1, 2018 at 6:11 PM, Ashesh Mishra <mishra.ash...@outlook.com >> <mailto:mishra.ash...@outlook.com>> wrote: >> >> Hi Greg, >> >> Your questions in the IETF-98 meeting seemed to stem from the challenges of >> authentication in fast BFD sessions at high scale. >> >> I'll address the issue in two parts - >> >> "Is there a need for authenticated BFD sessions?" - I believe we can all >> agree that there is a clear market need for BFD authentication. So we should >> direct the conversation to the way in which we can address this requirement. >> >> "How can authentication work at scale?" - BFD authentication puts >> significant stress on the system and a non-meticulous method alleviates this >> computation pressure. That's the premise of this draft as it presents a way >> to relieve the BFD authentication requirement based on the capability of the >> system to handle the additional stress which maintaining the session scale. >> >> There are some BFD systems in the market, which are not conducive to >> authentication (even the optimized method), where the impediment to >> authentication is due to the implementation details specific to that vendor >> or system. >> >> I believe all these issues were address during the meeting. Are there any >> specific questions that I missed or any recommendations for the method in >> which the requirements can be addressed? >> >> Thanks, >> Ashesh >> From: Rtg-bfd <rtg-bfd-boun...@ietf.org <mailto:rtg-bfd-boun...@ietf.org>> >> on behalf of Greg Mirsky <gregimir...@gmail.com >> <mailto:gregimir...@gmail.com>> >> Sent: Thursday, March 29, 2018 4:09:32 AM >> To: Jeffrey Haas >> Cc: rtg-bfd@ietf.org <mailto:rtg-bfd@ietf.org> >> Subject: Re: WGLC BFD Authentication Drafts >> >> >> >> Dear WG Chairs, et. al, >> >> I cannot support WG LC for draft-ietf-bfd-optimizing-authentication as my >> comments at BFD WG meeting dating back to IETF-98 >> <https://datatracker.ietf.org/meeting/98/materials/minutes-98-bfd-00> still >> not have been addressed nor even there was an attempt to address. As I've >> asked to clarify impact of the proposed mechanism, particularly periodic >> authentication, on the BFD State Machine, I'd point that the proposed >> mechanism directly affects BFD security as discussed in RFC 5880 and the >> section Security Considerations in the document, in my view, does not >> adequately reflects that and doesn't explain how the security of the BFD >> session maintained when the periodic authentication is in use. >> >> >> >> Regards, >> >> Greg >> >> >> >> On Wed, Mar 28, 2018 at 7:38 PM, Jeffrey Haas <jh...@pfrc.org >> <mailto:jh...@pfrc.org>> wrote: >> >> Working Group, >> >> The authors of the following Working Group drafts have requested >> Working Group Last Call on the following documents: >> >> https://tools.ietf.org/html/draft-ietf-bfd-secure-sequence-numbers-01 >> <https://tools.ietf.org/html/draft-ietf-bfd-secure-sequence-numbers-01> >> https://tools.ietf.org/html/draft-ietf-bfd-optimizing-authentication-04 >> <https://tools.ietf.org/html/draft-ietf-bfd-optimizing-authentication-04> >> https://tools.ietf.org/html/draft-ietf-bfd-stability-01 >> <https://tools.ietf.org/html/draft-ietf-bfd-stability-01> >> >> Given the overlap of functionality, WGLC will conclude for the bundle >> simultaneously. >> >> Authors, please positively acknowledge whether or not you know about any IPR >> for your documents. Progression of the document will not be done without >> that statement. >> >> Last call will complete on April 20. >> >> -- Jeff >> >> >> >> >> >> >> >> > > Mahesh Jethanandani > mjethanand...@gmail.com <mailto:mjethanand...@gmail.com> > Mahesh Jethanandani mjethanand...@gmail.com