Hi Uma, 
On Nov 7, 2014, at 6:26 PM, Uma Chunduri <uma.chund...@ericsson.com> wrote:

> Hi Acee,
> 
> Don't know about any incompatibilities in deployed implementations...
> But this is a good change and as you said, it is compatible to 7166.

Thanks for the endorsement. 

> 
> --
> Uma C.
> 
> PS:
> 
> Though off topic (and not  specific to OSPF too), but lot of RPs are stuck to 
> this SHA/apad stuff 
> but ideally  algorithms and their details  SHOULD be totally agnostic to  the 
> protocols.

I think this would have been possible. However, we’ve already have gone in this 
direction. 

Thanks,
Acee



> 
> -----Original Message-----
> From: OSPF [mailto:ospf-boun...@ietf.org] On Behalf Of Acee Lindem (acee)
> Sent: Friday, November 07, 2014 12:50 PM
> To: OSPF WG List
> Subject: Re: [OSPF] Security Extension for OSPFv2 when using Manual Key 
> Management
> 
> I guess everyone agree with this draft change?
> Thanks,
> Acee 
> 
> On 11/3/14, 12:57 PM, "Acee Lindem (acee)" <a...@cisco.com> wrote:
> 
>> Are there any implementations of this draft? There is, what I consider, 
>> a mistake in the source address protection. I¹d like to make it 
>> consistent with RFC 7166. Rather than repeating the IP Source Address 
>> (L/4) times in Apad, it is included once the same as is done with the 
>> IPv6 address in RFC 7166. Does this cause anyone any incompatibilities 
>> with deployed implementations?
>> 
>> OLD:
>>  OSPF routers sending OSPF packets must initialize Apad to the value
>>  of the IP source address that would be used when sending an OSPFv2
>>  packet, repeated L/4 times, where L is the length of the hash,
>>  measured in octets.  The basic idea is to incorporate the IP source
>>  address from the IP header in the cryptographic authentication
>>  computation so that any change of IP source address in a replayed
>>  packet can be detected.
>> 
>> NEW:
>>  OSPF routers sending OSPF packets must initialize the first 4 octets
>>  of Apad to the value of the IP source address that would be used when
>>  sending the OSPFv2 packet.  The remainder of Apad will contain
>>  the value of 0x878FE1F3 repeated (L - 4)/4 times, where L is the
>>  length of the hash, measured in octets.  The basic idea is to
>>  incorporate the IP source address from the IP header in the
>>  cryptographic authentication computation so that any change of IP
>>  source address in a replayed packet can be detected.
>> 
>> Thanks,
>> 
>> Acee
>> 
> 
> _______________________________________________
> OSPF mailing list
> OSPF@ietf.org
> https://www.ietf.org/mailman/listinfo/ospf

_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to