Hi Jeff,

> On Jul 26, 2021, at 7:48 AM, Jeffrey Haas <jh...@pfrc.org> wrote:
> 
> What's being requested is that our specifications have some specificity and
> a proposal be made for a suitable mechanism and how it integrates into BFD.
> :-)

Here are the set of changes that I propose we make to the draft to bring the 
specificity that you are requesting. For the introductory part of the document 
there is no reference to the method being applied to come up with a sequence 
number. It just states that the sequence number inserted is not the 
monotonically increasing sequence number. As such no changes are needed there.

The change therefore starts in Section 3 - Theory of operation. There are two 
changes that I see. One has to do with carrying of nonce in the first packet, 
and the other has to do with existing text in the section.

For the carrying of nonce in the first packet, Alan has already suggested 
adding the authentication section in the first packet. We will add text to that 
effect.

As far as the existing text in the section is concerned, we will replace 
reference to “symmetric key algorithm” and “symmetric algorithm” with “hash”. 
As a result, the sender will include a ciphertext that is a 32-bit hash 
computed using one of the algorithms Alan has suggested using a shared key 
(that is not necessarily symmetric) and inserted in-lieu of the sequence number 
of the packet. Yes, this draft is about obfuscation of the sequence number 
field of the packet, not the entire packet.  On reception of the BFD Control 
packet, the receiver instead of decrypting the ciphertext inserted in-place of 
the sequence number, will instead compare the ciphertext to pre-computed set of 
hashes using the same shared key, on the next k expected sequence numbers that 
are within the BFD Detect Multiplier range. If there is a match, the receiver 
will replace the ciphertext in the packet with the expected sequence number and 
pass the frame for further processing. In the case there is no match, it will 
drop the packet.

There are some similar updates to the Security Considerations section to 
replace “symmetric algorithm” with “hash”.

Are these set of changes enough to bring the specificity that you are looking 
for?

Thanks.

Mahesh Jethanandani
mjethanand...@gmail.com





Reply via email to