Hi Mahesh,
thank you for sharing the history of this mode. Are you proposing to remove
it from the specification?

Regards,
Greg

On Mon, Jul 2, 2018 at 11:41 AM, Mahesh Jethanandani <
mjethanand...@gmail.com> wrote:

> Hi Greg,
>
> The suggestion to authenticate every Nth frame came to us when we
> initially presented the draft. It was not part of the original draft. If I
> remember, the reason given was that if a MITM had taken over the session,
> then authenticating an occasional frame would help detect that. Note,
> however, a MITM cannot change the state of the session, because a change in
> the state of the session requires those frames to be authenticated by the
> sender, and for those frames to be marked valid by the receiver.
>
> Cheers.
>
>
> On Jul 2, 2018, at 11:06 AM, Greg Mirsky <gregimir...@gmail.com> wrote:
>
> Hi Mahesh,
> you've said:
>
>
> If three or more frames are discarded because one or all three of them
> were marked with NULL Auth TLV, and all of them fail authentication, the
> receiver brings the session down. Again, this is no different from three or
> more unauthenticated or meticulously authenticated frames being discarded,
> causing the receiver to bring the session down.
>
>
> My understanding of periodic mode is that when the BFD session is in Up
> state every Nth BFD Control packet is authenticated while rest of packets
> are not. Consider the scenario when each authenticated packet fails
> validation while unauthenticated packet pass. Would the state of the
> session remain Up? If so, what is the purpose of authentication? If not, if
> the session transitions to Down state, then it is, in my opinion, the
> change to BFD state machine per RFC 5880.
>
> Regards,
> Greg
>
> On Mon, Jul 2, 2018 at 9:58 AM, Mahesh Jethanandani <
> mjethanand...@gmail.com> wrote:
>
>> Picking up on this thread.
>>
>> The way to look at this draft is, that it suggests which frames will
>> undergo authentication. This draft does not suggest any change to the state
>> machine, or believe it causes a change in it. Frames that need
>> authentication will carry the NULL Auth TLV. If they are not authenticated
>> or do not need authentication they will not have the TLV.
>>
>> If a BFD session is down, and it is going through a P/F sequence the
>> frames need to be authenticated, since these frames *cause* a state
>> machine transition. If authentication fails, frames are discarded and the
>> session remains down. This is no different from a unauthenticated or a
>> meticulously authenticated P/F frame getting discarded, keeping the session
>> down.
>>
>> If the session is up, and it needs to be brought down, then the frame to
>> bring it down needs to be authenticated, again because these frames
>> *cause* a change in state machine. If it fails authentication, the frame
>> is discarded and the session remains up. Again, this is no different from a
>> unauthenticated frame or a meticulously authenticated frame being
>> discarded, keeping the session up.
>>
>> If three or more frames are discarded because one or all three of them
>> were marked with NULL Auth TLV, and all of them fail authentication, the
>> receiver brings the session down. Again, this is no different from three or
>> more unauthenticated or meticulously authenticated frames being discarded,
>> causing the receiver to bring the session down.
>>
>> Cheers.
>>
>> On Apr 9, 2018, at 12:39 PM, Greg Mirsky <gregimir...@gmail.com> wrote:
>>
>> Hi Ashesh,
>> thank you for your response to my questions.. I think I need some more of
>> your help to locate the text in RFC 5880 that, as you've stated, mandates
>> that the single failure to authenticate a BFD control packet in Up
>> state triggers the transition to Down state. I only see section 6.7 that
>> describes authentication validation and when the received control packet
>> must be discarded because of validation failure and the following text:
>>       If the A bit is set, the packet MUST be authenticated under the
>>       rules of section 6.7, based on the authentication type in use
>>       (bfd.AuthType).  This may cause the packet to be discarded.
>> But I don't find any text that states that if authentication is in use,
>> then Detect Time calculated regardless of the value of the Detect Mult
>> field. Perhaps I will extend the description of the scenario:
>>
>>    - authentication is in use and every, for example, the fourth packet
>>    to be authenticated, i.e. three control packets with NULL Auth TLV 
>> followed
>>    by "real" authenticated control packet;
>>    - initial packets, three-way handshake, pass authentication
>>    verification and the session is Up;
>>    - at some point, the verification of the "real" authenticated packets
>>    fails and it is discarded;
>>    - packets with NUL Auth TLV pass the validation.
>>
>> Appreciate your consideration and help.
>>
>> Regards,
>> Greg
>>
>> On Mon, Apr 9, 2018 at 10:51 AM, Ashesh Mishra <mishra.ash...@outlook.com
>> > wrote:
>>
>>> Hi Greg,
>>>
>>>
>>>
>>> What I meant to say was that the state machine remains the same as in
>>> the case of 5880 authentication. If an authentication frame fails
>>> validation then the session goes down regardless of good OPER-UP frames
>>> (authentication or normal) before or after that frame. Since the behavior
>>> in 5880 does not require any more than 1 frame to fail validation, the
>>> mechanism works as-is in the new proposal. Once the session is down, all
>>> frames need to be authenticated to bring the session up so again, the
>>> session can’t come back up just because the frame that failed validation is
>>> followed by a stream of unauthenticated frames.
>>>
>>>
>>>
>>> Hope that addresses the gap that you presented.
>>>
>>>
>>>
>>> Ashesh
>>>
>>>
>>>
>>> *From: *Greg Mirsky <gregimir...@gmail..com <gregimir...@gmail.com>>
>>>
>>> *Date: *Tuesday, April 3, 2018 at 8:35 PM
>>>
>>>
>>> *To: *Ashesh Mishra <mishra.ash...@outlook.com>
>>> *Cc: *Jeffrey Haas <jh...@pfrc.org>, "rtg-bfd@ietf.org" <
>>> rtg-bfd@ietf.org <rtg-...@ietf..org>>
>>> *Subject: *Re: WGLC BFD Authentication Drafts
>>>
>>>
>>>
>>> Hi Asheh,
>>>
>>> thank you for the detailed response to my questions and consideration of
>>> my comments.
>>>
>>> I think I cannot agree that the BFD state machine remains unchanged if
>>> optimized BFD authentication is in periodic mode. Let's consider case when
>>> only every 5th BFD control packet is authenticated when the session is in
>>> Up state. What happens if from some moment every authenticated packet fails
>>> to be validated? Would the session go to Down state? But all
>>> unauthenticated BFD control packets pass the validation check and since
>>> only one packet seems to miss validation the session, if the state machine
>>> remains unchanged, will stay Up.
>>>
>>>
>>>
>>> Do you see this as plausible scenario?
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Tue, Apr 3, 2018 at 11:03 AM, Ashesh Mishra <
>>> mishra.ash...@outlook.com> wrote:
>>>
>>> Thanks for the clarification, Greg.
>>>
>>>
>>>
>>> Here are my thoughts on the issues:
>>>
>>>
>>>
>>> *I'd break it into couple more specific questions: *
>>>
>>> ·         *can the periodic Optimized Authentication mode be used
>>> without authorization o state changes;*
>>>
>>> ·         *if the answer to the previous question "yes", then when the
>>> first authorized BFD control packet must be transmitted by the system;*
>>>
>>> ·         *does the BFD state machine (section 6.2 RFC 5880) changes
>>> resulting from introduction of periodic optimized authentication mode;*
>>>
>>> *[AM] The optimized authentication can be used without state changes and
>>> the first auth packet will be the DOWN state frame to kick-off the session
>>> negotiation as the proposal suggests that all DOWN state frames are
>>> authenticated. The state machine does not change in this proposal but it
>>> only indicates which frames should be authenticated and which ones can use
>>> NULL-AUTH TLV (un-authenticated frames). *
>>>
>>> *And additional comments:*
>>>
>>> ·         *"For example, the two ends can decide that BFD frames that
>>> indicate a state change should be authenticated and enable authentication
>>> on those frames only."*
>>>
>>> *I don't think that nodes "decide" anything but are configured to do
>>> something.*
>>>
>>>
>>>
>>> *[AM] I agree that the language is not accurate. We’ll change it in the
>>> next revision. The intention is to use indicate configuration rather than
>>> negotiation. *
>>>
>>> ·         *"If the two ends have not previously negotiated which frames
>>> they will transmit or receive with authentication enabled ..."*
>>>
>>> *I couldn't find the negotiation procedure being described in the
>>> document. Is it out-of-band, i.e. by control or management plane, not part
>>> of this BFD enhancement?*
>>>
>>>
>>>
>>> *[AM] The language should indicate configuration instead of negotiation..
>>> *
>>>
>>> ·         *"The configuration of the periodic authentication interval
>>> for BFD CC UP frames is an open issue."*
>>>
>>> *I believe that this open issue must be resolved in the definitive
>>> manner before the draft moved to WGLC.*
>>>
>>>
>>>
>>> *[AM] This line should be removed and the preceding text should indicate
>>> that the parameters for authentication should be configured on the session
>>> end-points. *
>>>
>>>
>>>
>>> Regards,
>>> Ashesh
>>>
>>>
>>>
>>> *From: *Greg Mirsky <gregimir...@gmail.com>
>>> *Date: *Monday, April 2, 2018 at 12:34 PM
>>> *To: *Ashesh Mishra <mishra.ash...@outlook.com>
>>> *Cc: *Jeffrey Haas <jh...@pfrc.org>, "rtg-bfd@ietf.org" <
>>> rtg-bfd@ietf.org>
>>>
>>>
>>> *Subject: *Re: WGLC BFD Authentication Drafts
>>>
>>>
>>>
>>> Hi Asheh,
>>>
>>> thank you for taking time to review the minutes from BFD WG meeting at
>>> IETF-98. I don't think that we had enough time to discuss in details my
>>> question:
>>>
>>> Greg Mirsky: One of the possible modes when the session is up is to use
>>> authentication with periodic timer trigger?
>>>
>>> I'd break it into couple more specific questions:
>>>
>>>    - can the periodic Optimized Authentication mode be used without
>>>    authorization o state changes;
>>>    - if the answer to the previous question "yes", then when the first
>>>    authorized BFD control packet must be transmitted by the system;
>>>    - does the BFD state machine (section 6.2 RFC 5880) changes
>>>    resulting from introduction of periodic optimized authentication mode;
>>>
>>> And additional comments:
>>>
>>>    - "For example, the two ends can decide that BFD frames that
>>>    indicate a state change should be authenticated and enable authentication
>>>    on those frames only."
>>>
>>> I don't think that nodes "decide" anything but are configured to do
>>> something.
>>>
>>>
>>>    - "If the two ends have not previously negotiated which frames they
>>>    will transmit or receive with authentication enabled ..."
>>>
>>> I couldn't find the negotiation procedure being described in the
>>> document. Is it out-of-band, i.e. by control or management plane, not part
>>> of this BFD enhancement?
>>>
>>>
>>>    - "The configuration of the periodic authentication interval for BFD
>>>    CC UP frames is an open issue."
>>>
>>> I believe that this open issue must be resolved in the definitive manner
>>> before the draft moved to WGLC.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>>
>>>
>>> On Sun, Apr 1, 2018 at 6:11 PM, Ashesh Mishra <mishra.ash...@outlook.com>
>>> wrote:
>>>
>>> Hi Greg,
>>>
>>> Your questions in the IETF-98 meeting seemed to stem from the challenges
>>> of authentication in fast BFD sessions at high scale.
>>>
>>> I'll address the issue in two parts -
>>>
>>> "Is there a need for authenticated BFD sessions?" - I believe we can all
>>> agree that there is a clear market need for BFD authentication. So we
>>> should direct the conversation to the way in which we can address this
>>> requirement.
>>>
>>> "How can authentication work at scale?" - BFD authentication puts
>>> significant stress on the system and a non-meticulous method alleviates
>>> this computation pressure. That's the premise of this draft as it presents
>>> a way to relieve the BFD authentication requirement based on the capability
>>> of the system to handle the additional stress which maintaining the
>>> session scale.
>>>
>>> There are some BFD systems in the market, which are not conducive to
>>> authentication (even the optimized method), where the impediment to
>>> authentication is due to the implementation details specific to that vendor
>>> or system.
>>>
>>> I believe all these issues were address during the meeting. Are there
>>> any specific questions that I missed or any recommendations for the method
>>> in which the requirements can be addressed?
>>>
>>> Thanks,
>>> Ashesh
>>> ------------------------------
>>>
>>> *From:* Rtg-bfd <rtg-bfd-boun...@ietf.org> on behalf of Greg Mirsky <
>>> gregimir...@gmail.com>
>>> *Sent:* Thursday, March 29, 2018 4:09:32 AM
>>> *To:* Jeffrey Haas
>>> *Cc:* rtg-bfd@ietf.org
>>> *Subject:* Re: WGLC BFD Authentication Drafts
>>>
>>>
>>>
>>> Dear WG Chairs, et. al,
>>>
>>> I cannot support WG LC for draft-ietf-bfd-optimizing-authentication as
>>> my comments at BFD WG meeting dating back to IETF-98
>>> <https://datatracker.ietf.org/meeting/98/materials/minutes-98-bfd-00> still
>>> not have been addressed nor even there was an attempt to address. As I've
>>> asked to clarify impact of the proposed mechanism, particularly periodic
>>> authentication, on the BFD State Machine, I'd point that the proposed
>>> mechanism directly affects BFD security as discussed in RFC 5880 and the
>>> section Security Considerations in the document, in my view, does not
>>> adequately reflects that and doesn't explain how the security of the BFD
>>> session maintained when the periodic authentication is in use.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Wed, Mar 28, 2018 at 7:38 PM, Jeffrey Haas <jh...@pfrc.org> wrote:
>>>
>>> Working Group,
>>>
>>> The authors of the following Working Group drafts have requested
>>> Working Group Last Call on the following documents:
>>>
>>> https://tools.ietf.org/html/draft-ietf-bfd-secure-sequence-numbers-01
>>> https://tools.ietf.org/html/draft-ietf-bfd-optimizing-authentication-04
>>> https://tools.ietf.org/html/draft-ietf-bfd-stability-01
>>>
>>> Given the overlap of functionality, WGLC will conclude for the bundle
>>> simultaneously.
>>>
>>> Authors, please positively acknowledge whether or not you know about any
>>> IPR
>>> for your documents.  Progression of the document will not be done without
>>> that statement.
>>>
>>> Last call will complete on April 20.
>>>
>>> -- Jeff
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>>
>> Mahesh Jethanandani
>> mjethanand...@gmail.com
>>
>>
>
> Mahesh Jethanandani
> mjethanand...@gmail.com
>
>

Reply via email to