Hi Dacheng,
HW became more capable and we, one hopes, wiser. Perhaps it's time to re-visit 
our options.

        Regards,
                Greg

-----Original Message-----
From: Dacheng Zhang [mailto:[email protected]] 
Sent: Monday, November 23, 2015 11:12 PM
To: Gregory Mirsky; Marc Binderberger; Reshad Rahman (rrahman); 
[email protected]; Stephen Farrell
Cc: [email protected]
Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication



在 15-11-24 下午2:46, "Gregory Mirsky" <[email protected]> 写入:

>Dear All,
>I'd like to share comment by Security AD Stephen Farrell on a work that 
>is directly related to BFD, draft-ietf-mpls-lsp-ping-mpls-tp-oam-conf
>(hope it is OK to raise security awareness in BFD community):
>
>> - 2.1.1, is there any chance of moving on from the "Keyed SHA1"
>> 
>> from RFC5880 to e.g. HMAC-SHA256 for this? We're generally trying to 
>> get that kind of transition done as we can and moving to use of a 
>> standard integrity check rather than a more home-grown one has some 
>> benefits. The HMAC-SHA1-like thing you're doing is still probably ok, 
>> (though could maybe do with crypto eyeballs on it as there may have 
>> been relevant new results since 2010) but future-proofing would 
>> suggest moving to HMAC-SHA256 if we can. (I can imagine such a change 
>> might require a new document, but am asking anyway:-)
>> 
>> GIM>> The fact is that we're bound by what is defined in RFC 5880.
>
>I wonder for how long though, that's now a five year old RFC.
>Assuming it takes a few years for new deployments to pick up new 
>algorithms, isn't it time that a whole bunch of algorithm choices were 
>revisited?
>
>> There was a proposal to strengthen BFD security BFD Generic  
>>Cryptographic
>>Authentication<http://tools.ietf.org/html/draft-bhatia-bfd-crypto-auth
>>-03
>>> but the document had expired.
>
>Pity that.

I am one of the co-author of that draft. We didn’t try to update document 
because we got the feedback from the group that the influence on the 
performance is a big concern. That is why I raised the question in the last 
email whether it is a good time for us to re-consider the usage of
aha-2 in BFD.
>


Reply via email to