Alan,

On Mon, Jul 26, 2021 at 10:35:01AM -0400, Alan DeKok wrote:
> 
>   That should be possible.
[...]
>   Yes.
[...]
>   Yes.
> 
> > This means that the benefit for the feature would require a function that
> > can be run on a window of packets for predicted inputs and generate the pool
> > of next expected sequence numbers.
> 
>   Yes.
> 
>   I think a cryptographic random number generator here is likely OK.  Those 
> are usually simple, and fast.  The system can be seeded with a strong secret, 
> or maybe hash of a secret and other information.
> 
>   My suggestion to calculate a hash over the packet is that it prevents 
> certain kinds of attacks.  i.e. an attacker could take packet X, and sequence 
> number Y, and put the two together, to spoof / forge state.
> 
>   Fixing that requires that the sequence number is somehow tied to a 
> particular packet.

I don't dispute that these things are possible.

What's being requested is that our specifications have some specificity and
a proposal be made for a suitable mechanism and how it integrates into BFD.
:-)

In any case, you've minimally confirmed that the current text in the
secure-sequence numbers draft is misleading in suggesting a reversible
operation.  The procedural text there thus needs work to incorporate the
points discussed.

-- Jeff

Reply via email to