Hi Greg,
Thanks for the review and comments. Please see inline.
    On Sunday, February 20, 2022, 05:09:22 PM EST, Greg Mirsky 
<gregimir...@gmail.com> wrote:  
 
 Dear Authors,I've read the current version of the draft and have several 
questions. Greatly appreciate your consideration and feedback.   
   - The document uses the normative language and is on the Standard track. At 
the same time, the behavior of the passive BFD system is entirely local and has 
no impact on the active BFD system. It appears like the use of normative 
language describing the implementation of the passive BFD system is 
unnecessary. It appears that the Informational track is more appropriate for 
this specification.
<RR> This was debated extensively ~15 months ago. I'll defer to Jeff H and John 
S, but the last email I have on this is the following: 
https://mailarchive.ietf.org/arch/msg/rtg-bfd/vOMZl9ucZwNKu5_MHHti-4ImOjQ/#
   
   - It appears that the YANG data model allows the BFD unsolicited only for 
the single-hop BFD. What, in your opinion, prevents allowing it for multi-hop 
BFD?
<RR> As per reply to Gyan, we will extend the document + YANG to support 
multi-hop.
https://mailarchive.ietf.org/arch/msg/rtg-bfd/567Ey36geGC427ulnAqcWFag3xc/

   
   - In the following text:

   The "Passive role" may change to the "Active role" when a local

   client registers for the same BFD session, and from the "Active role

   " to the "Passive role " when there is no longer any locally

   registered client for the BFD session.

it is not clear to me as to which BFD session is the reference "for the same 
BFD session". Is that for the session that is already in the Up state? Or 
something else?
<RR> It is for the already created session. So a session is created in 
"passive" state via BFD unsolicited procedure (no local client or config for 
it). After that a local client wants the same session (e.g. because BFD was 
enabled under a client), the BFD session becomes "active". We'll see if we can 
make this clearer.

   
   - Two recommendations in the Security Considerations section:

   o  Apply "access control" to allow BFD packets only from certain      
subnets or hosts....   o  Use BFD authentication.

leave some serious doubts that the proposed model does bring any operational 
simplification compared to explicitly configuring BFD on both systems 
(especially to use authentication).

<RR> Good point. I think it depends. e.g. if BFD authentication is already in 
use, this is not an issue. 
Regards,Reshad.


Regards,Greg  

Reply via email to