Hi Greg,

But all packets that indicate a state change are authenticated. That has been 
the original premise of the draft, with or without a Detect Multiplier.

For example, we say in Section 1

   This document proposes that only BFD frames that signal a state
   change in BFD be authenticated.

The only question was with a steady stream, and no state change, how many 
authenticated packets needed to be sent to thwart a MITM attack. 

Cheers.


> On Oct 13, 2018, at 1:10 PM, Greg Mirsky <gregimir...@gmail.com> wrote:
> 
> Hi Mahesh, Authors, et. al,
> thank you for your thoughtful consideration of the discussion in Montreal. 
> I've checked the changes in the new version and I think that the agreement 
> we've reached was not merely recommend that the authenticated BFD Control 
> packets be sent as series of at least Detect Multiplier packets but require, 
> i.e., make it mandatory for both periodic and state change modes. Here's the 
> quote from the minutes:
>     Jeff Haas: one possibility is to send detect multiplier number of 
> consecutive authenticated packets, then the session will go down if 
> authentication packets fail validation.
>     Greg Mirsky: does that require use of P/F procedure?
>     Jeff Haas: P/F is not needed, we send consecutive authenticated packets
>     Mahesh Jethanandani: we can make that change.
>     Reshad Rahman: is there a need to do the same for state change?
>     Mahesh Jethanandani: every state change packet has to be authenticated.
>     Jeff Haas: for pedantic reasons, when making the state change we should 
> do the same. On P/F sequence we should do    this for the new multiplier if 
> it’s longer. We’ll take this back to the mailing list.
> Thus I suggest to consider changes along the following:
> OLD TEXT:
>  To detect a Man In the Middle (MITM)
>    attack, it is also proposed that a non-state change frame be
>    authenticated occasionally.  The interval of this non-state change
>    frame can be configured depending on the detect multiplier and the
>    capability of the system.  As an example, this could be equal to the
>    detect multiplier number of packets.
> NEW TEXT:
>   To detect a Man In the Middle (MITM)
>    attack, it is also proposed that a non-state change set of authenticated 
> frames be
>    sent occasionally.  The number of consecutively transmitted authenticated 
> BFD control packets in the set
>    MUST be not lesser than the value of the Detect Multiplier and the 
> interval between such non-state change
>    set of frames can be configured depending on the
>    capability of the system.  
> If acceptable, similar change should be made to the following text:
>    Authenticating a small subset of these frames, for example, a detect
>    multiplier number of packets per configured period, significantly
>    reduces the computational demand for the system while maintaining
>    security of the session across the configured authentication periods.
> to change from recommendation "for example" to stronger normative language.
> 
> Regards,
> Greg
> 
> On Thu, Oct 11, 2018 at 4:31 PM Mahesh Jethanandani <mjethanand...@gmail.com 
> <mailto:mjethanand...@gmail.com>> wrote:
> This version of the draft addresses comments received at IETF 102 as part of 
> LC. At this point, the authors believe that this document, along with 
> draft-ietf-bfd-secure-sequence-numbers and draft-ietf-bfd-stability are ready 
> for IESG.
> 
> Thanks.
> 
> > On Oct 11, 2018, at 4:25 PM, internet-dra...@ietf.org 
> > <mailto:internet-dra...@ietf.org> wrote:
> > 
> > 
> > A New Internet-Draft is available from the on-line Internet-Drafts 
> > directories.
> > This draft is a work item of the Bidirectional Forwarding Detection WG of 
> > the IETF.
> > 
> >        Title           : Optimizing BFD Authentication
> >        Authors         : Mahesh Jethanandani
> >                          Ashesh Mishra
> >                          Ankur Saxena
> >                          Manav Bhatia
> >       Filename        : draft-ietf-bfd-optimizing-authentication-06.txt
> >       Pages           : 7
> >       Date            : 2018-10-11
> > 
> > Abstract:
> >   This document describes an optimization to BFD Authentication as
> >   described in Section 6.7 of BFD RFC5880.
> > 
> > 
> > 
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-bfd-optimizing-authentication/ 
> > <https://datatracker.ietf.org/doc/draft-ietf-bfd-optimizing-authentication/>
> > 
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-bfd-optimizing-authentication-06 
> > <https://tools.ietf.org/html/draft-ietf-bfd-optimizing-authentication-06>
> > https://datatracker.ietf.org/doc/html/draft-ietf-bfd-optimizing-authentication-06
> >  
> > <https://datatracker.ietf.org/doc/html/draft-ietf-bfd-optimizing-authentication-06>
> > 
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-bfd-optimizing-authentication-06
> >  
> > <https://www.ietf.org/rfcdiff?url2=draft-ietf-bfd-optimizing-authentication-06>
> > 
> > 
> > Please note that it may take a couple of minutes from the time of submission
> > until the htmlized version and diff are available at tools.ietf.org 
> > <http://tools.ietf.org/>.
> > 
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-drafts/>
> > 
> 
> Mahesh Jethanandani
> mjethanand...@gmail.com <mailto:mjethanand...@gmail.com>
> 
> 
> 

Mahesh Jethanandani
mjethanand...@gmail.com



Reply via email to