Hi Manav,

I think that the authentication trailer should follow the LLS and should secure LLS as well as the other OSPF data. Even if an implementation doesn't want to completely support LLS, I think it is reasonable to require that in order to support the AT extension it can know how to find the AT when there is an LLS block.

I would also like to see this draft include similar Session ID and Nonce as defined in draft-bhatia-karp-ospf-ip-layer-protection-01.txt although perhaps make it an optional feature.

Thanks,
Michael

On 01/19/2011 04:05 AM, Bhatia, Manav (Manav) wrote:

Hi Acee,
I think the idea behind this logic was for the purposes of backward
compatibility. I agree that this is not right if *all* routers support
the AT capability. However, if you have even one router that does not
support this, then you would probably need this mechanism.How would an
implementation, that is AT incapable, send an OSPFv3 + LLS block to a
router, if the receiving end always implicitly assumes the presence of
an authentication trailer? One could argue that if the AT router has
turned ON authentication then it MUST only accept packets with the AT
block, but then we are taking a giant leap of faith where we're assuming
that ALL routers will simultaneously turn on the AT mechanism.
If folks think that this opens a security hole, then vendors could add a
knob that could toggle this behavior. By default, the knob could assume
the presence of an authentication trailer if auth has been turned on.
The second state would be where authentication trailer is assumed to be
present only if the AT bit is set.
If folks agree to this, then we could add a note about this in the next
revision.
Cheers, Manav

_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to