draft-ietf-bfd-optimizing-authentication-17 has been published with the 
comments to date addressed.

-- Jeff

> On Jun 19, 2024, at 2:51 PM, Jeffrey Haas <jh...@pfrc.org> wrote:
> 
> Reshad,
> 
> The pending changes covered in addressing your comments are currently in this 
> github pull request:
> https://github.com/bfd-wg/optimized-auth/pull/46 
> <https://github.com/bfd-wg/optimized-auth/pull/46>
> 
> Details below.
> 
> 
>> On Jun 12, 2024, at 11:19 PM, Reshad Rahman 
>> <reshad=40yahoo....@dmarc.ietf.org 
>> <mailto:reshad=40yahoo....@dmarc.ietf.org>> wrote:
>> 
>> Authors, BFD WG,
>> 
>> Here are my comments on draft-ietf-bfd-optimizing-authentication (hence 
>> subject change). I have strived to go back to previous discussions to make 
>> sure I'm not reopening any closed issues, but I could have missed some.
>> 
>> Section 1
>> ---------
>> 
>> - 2nd paragraph "Control packets that do not require a poll sequence, such 
>> as bfd.RequiredMinRxInterval...". I think the last part should be "such as a 
>> change in bfd.RequiredMinRxInterval..."
> 
> Changed.
> 
>>  
>> - 2nd paragraph, last sentence starting with "In other words": I have a hard 
>> time groking the part "...aside from the authentication section without 
>> stronger authentication...". I think this is reiterating that if an Up 
>> packet changes we need to use stronger authentication, but is there anything 
>> else?
> 
> There's nothing else.  The intent here is to summarize the key point 
> succinctly.
> 
>> 
>> - Part which starts with "Once the session has reached the Up state". There 
>> is 1 less computationally intensive auth type which is using ISSAC. Then it 
>> says that "To detect an on-path attacker" we have 2 options: strong auth or 
>> ISAAC. If we were already using ISAAC and we switch to ISAAC, hoes does that 
>> help? I am probably missing something. 
> 
> This is a lingering issue from when null auth was part of this procedure.
> 
> My proposed change is to remove the text about "to detect an on-path 
> attacker", to use the following text instead:
> 
> "When using optimized methods of authentication, BFD sessions should 
> periodically test the session using strong authentication. Strong 
> authentication is tested using a Poll sequence. To test strong 
> authentication, a Poll sequence SHOULD be initiated by the sender using the 
> strong authentication Auth Type rather than the chosen optimized Auth Type. 
> If a control packet with the Final (F) bit is not received within the Detect 
> Interval, the session has been compromised, and should be brought down. The 
> interval for initiating a Poll sequence can be configured depending on the 
> capability of the system."
> 
>> 
>> - "If a Fin is not received" should be "If a control packet with the Final 
>> (F) but is not received".
> 
> In the diff.
> 
>> 
>> - Last paragraph, the term "configured interval" here and in 1.3 refers to 
>> the "reauth-interval"? Mention that in section 1 and also "configured 
>> interval" if used alone is misleading since there are many configured 
>> intervals in BFD? Also I don't see the need to have "configured interval" in 
>> the terminology section since it's only used once afaik in the document.
> 
> I'm proposing this become "configured strong reauthentication interval" to 
> clarify the situation.
> 
>> 
>> Section 1.3
>> -----------
>> 
>> - Add "Auth Type" to terminology section?
> 
> Done.
> 
>> 
>> Section 2
>> ---------
>> 
>> - Typo: authentiation
> 
> Fixed.
> 
>> 
>> - Figure 1: so we can use OPT if there's no state change even when in INIT 
>> or DOWN state? Per section 1, it should only be in UP state?
> 
> Oi, that's been in there for a while.  Auth now only in Up/Up states.
> 
> The other authors will have to remind me if there was reason we had it in the 
> other states.
> 
>> 
>> Section 3
>> ---------
>> 
>> - Section 3, first sentence "type supporting Optimized BFD authentication", 
>> add a reference to section 6.1.
> 
> Done.
> 
>> 
>> - "Optimized:", mention those are the values of the field with "Values are:" 
>> as is typically done.
> 
> 
> Now reads:
> 
>          The values of the Optimized field are:
> 
>> 
>> Section 4
>> ---------
>> 
>> - Typo in 3rd paragraph "there is problems"
> 
> Fixed.
> 
>> 
>> Section 5.3 (YANG)
>> ------------------
>> 
>> - It needs to be mentioned explicitly that optimizing authentication is 
>> enabled by using 1 of the 2 new crypto-algorithm, it's implied but not 
>> clearly spelled out.
> 
> I've added:
> "Implementations supporting the optimization procedures defined in this 
> document enable optimization by using one of the newly defined key-chain 
> crypto-algorithms defined in this YANG module."
> 
>> 
>> - Define a grouping for reauth-interval
> 
> Done.
> 
>> - There's an identity for null-auth but IIRC use of null-auth has been 
>> removed from the optimization mechanism a few months ago. can we remove 
>> null-auth from this document?
> 
> Removed.
> 
> Fundamentally the thing we're juggling with the reorgs is to make sure we 
> don't have conflicting updates in the yang modules.  So, we'll be checking 
> this vs. the bfd stability document as well.
> 
>> 
>> Section 7
>> ---------
>> 
>> - If reauth-interval is set very low, I understand how the optimization is 
>> worthless. But why is that the case if reauth-interval is very high, I mean 
>> optimization would be great? Do you mean that we'd be insecure if it's too 
>> high?
> 
> This was addressed as part of the secdir review.  See if the new text 
> addresses your concerns.
> 
>> 
>> - Some time ago we discussed the impact of enabling optimized authentication 
>> and how it could make a session go down. IIRC the mixed (strong + opt) 
>> crypto-algorithm was added to mitigate that. Do we need some text in this 
>> section or elsewhere to describe that procedure?
> 
> I don't think so, but might be convinced otherwise.  The current procedures 
> are "one-stop enable this auth type and you get all of the appropriate 
> things".  Before, it was the weird conflict between which mode was configured 
> and whether there was an optimized flag to turn things on.
> 
> 
>> Did we consider putting a session admin-down before enabling/disabling 
>> optimized auth?
> 
> In the current procedure, it's a single setting to use a pairing of 
> strong/optimized auth in a single type.  This wouldn't be necessary.
> 
> More broadly, this also avoids the mid-flight auth changes that RFC 5880 
> handwaves the complexity for.
> 
>> 
>> Section 8
>> ---------
>> 
>> Rehman -> Rahman
> 
> Fixed.
> 
>> 
>> Section B.1
>> -----------
>> 
>> - key-chain "bfd-auth-config' is defined but not used in the BFD session 
>> authentication section. Sigh, why didn't we put key-chain as mandatory...
> 
> Fixed example, and to be audited by Mahesh.  
> 
> At least one motivation to not make it mandatory is a lack of clear procedure 
> of "auth is enabled, and that auth is 'off'". :-P
> 
> Attached, find the output from iddiff.
> 
> -- Jeff
> 
> <16-17.html>
> 

Reply via email to