Hi Jeff,
> On Jul 26, 2021, at 7:48 AM, Jeffrey Haas <jh...@pfrc.org> wrote: > > What's being requested is that our specifications have some specificity and > a proposal be made for a suitable mechanism and how it integrates into BFD. > :-) Here are the set of changes that I propose we make to the draft to bring the specificity that you are requesting. For the introductory part of the document there is no reference to the method being applied to come up with a sequence number. It just states that the sequence number inserted is not the monotonically increasing sequence number. As such no changes are needed there. The change therefore starts in Section 3 - Theory of operation. There are two changes that I see. One has to do with carrying of nonce in the first packet, and the other has to do with existing text in the section. For the carrying of nonce in the first packet, Alan has already suggested adding the authentication section in the first packet. We will add text to that effect. As far as the existing text in the section is concerned, we will replace reference to “symmetric key algorithm” and “symmetric algorithm” with “hash”. As a result, the sender will include a ciphertext that is a 32-bit hash computed using one of the algorithms Alan has suggested using a shared key (that is not necessarily symmetric) and inserted in-lieu of the sequence number of the packet. Yes, this draft is about obfuscation of the sequence number field of the packet, not the entire packet. On reception of the BFD Control packet, the receiver instead of decrypting the ciphertext inserted in-place of the sequence number, will instead compare the ciphertext to pre-computed set of hashes using the same shared key, on the next k expected sequence numbers that are within the BFD Detect Multiplier range. If there is a match, the receiver will replace the ciphertext in the packet with the expected sequence number and pass the frame for further processing. In the case there is no match, it will drop the packet. There are some similar updates to the Security Considerations section to replace “symmetric algorithm” with “hash”. Are these set of changes enough to bring the specificity that you are looking for? Thanks. Mahesh Jethanandani mjethanand...@gmail.com