Authors, Since secure sequence numbers is heading toward WGLC, it's time to refresh this document and review it vs. secure sequence numbers, and bfd stability.
----- From Introduction and some confusion about configuration and operational state: "This document also proposes that all BFD control packets which signal a significant change MUST be authenticated if the session's bfd.AuthType is non-zero. Other BFD control packets MAY be transmitted and received without the A bit set." There's a bit of semantic confusion here. bfd.AuthType is what we use as our state and what we put in our packet. And similarly, we're trying to say here that "authentication may not be required for some packets". Part of where this is potentially confusing is that these mechanisms are documenting changes from one auth type to the other. This means we have, leveraging management framework terminology, configuration state that represents "start with authentication X, which will use method 1 that goes into bfd.AuthType and user method 2 which also goes into bfd.AuthType". This also has implications when we have this bit of composite configuration with regards to authentication that isn't expected (i.e. NULL when secure seq is configured) needs to be addressed. For operational state, reflecting the active type may be fine, but reflecting the hybrid configuration state is also necessary. One way to work through how to adjust the text is consider what the updates to the YANG module might look like. 1.2: s/a demand model/a demand mode/ "configured interval" probably needs to be more specific to this mechanism. In particular, this is the interval for how long before we retry strong authentication. 2. Authentication Mode: The text in this section indicates that there are circumstances where no authentication (a-bit is off) is permissible. However, the text then moves to discuss NULL authentication, which is authentication that still carries an a-bit, and has contents. This is likely from earlier work prior to realizing we want some form of anti-replay attack. I suspect the correct thing to do here is move all text toward discussing the "non-authenticated" mode as the less encumbered authentication, of which this document defines the NULL method. The text for secure sequence numbers also is now incorrect since the mechanism has evolved. 3. NULL Auth Type. The main text here in need of updating is the sequence numbers. As we've worked through in the discussions for secure sequence numbers, we want the sequence numbers to be preserved across authentication mechanisms. Is the answer to take the text we have in secure sequence numbers covering this detail and move them to this document? -- Jeff