Reviewer: Jürgen Schönwälder
Review result: Has Issues
* Abstract
It fails to tell a reader what this document provides and leaves the
paper with a pointer to section 6.7 of RFC 5880.
* Introduction
The first paragraph leaves me puzzled as it is not clear what the
concerns are. Is it that cryptographic hash algorithms are generally
too expensive? Is this still true of you have hardware support? Or
is this work driven by specific concerns about the security of
specific cryptographic hash algorithms? Anyway, cryptoagility
implies that hash algorithms should be replaceable.
The second paragraph describes what the experiment is but it still
does not say what the optimization is all about. And then I read
about procedural classification of this document. It is only
afterwards that the text starts to educate the reader what this is
all about. But again, this is by first introducing details first
before coming to the point that the idea is to authenticate only some
of the BFD packets and not all of them. This should have been in the
abstract and right at the beginning of the introduction.
I found it funny that MD5 and SHA1 are considered "strong" a few
sentences after it was said that there are substantial concerns
about the strength of MD5 and SHA1. Interestingly, RFC 5880 actually
says: "The use of MD5-based authentication is strongly discouraged."
That is clear language. ;-)
What does "significantly reduces the computational demand for the
system while maintaining security of the session across the
configured strong reauthentication interval" mean? If you go from
authenticating each packet to authenticating say every N packets,
then the performance gain does come with a reduced level of security
since there are packets that are not authenticated. Perhaps it is OK
to make this trade-off but it feels like the authors prefer to not be
explicit about this trade-off.
* Authentication Mode
I wonder whether "optimized" is the right term. Is less security
more optimal? Perhaps it is "reduced" authentication or "more
lightweight" authentication? Well, perhaps in the industry,
"optimized" authentication is just a synonym for reduced
authentication?
* Signaling Optimized Authentication
Existing implementations will ignore the optimized authentication
mode, I assume authors have verified that some systems ignoring the
mode will not cause operational problems.
* Optimizing Authentication YANG Model
What is the reason for a default of 60 seconds for the reauth
interval? According to the security considerations, there is a
security vs. performance trade-off here. Any particular reason
why 60 seconds is a good setting?
* Security Considerations
I am puzzled by this statement:
"The approach described in this document enhances the ability to
authenticate a BFD session by taking away the onerous requirement
that every BFD control packet be authenticated."
How does strongly authenticating only some packets enhance the
ability to authenticate a BFD session? I also wonder how you close
the section with "further enhances the security of BFD sessions".
My naive understanding is that non-optimized BFD authentication is
stronger than optimized secure BFD authentication even with sequence
number authentication. Or said differently, if security is your
prime operational concern, do not use "optimized" BFD authentication.
From an operational perspective, I prefer documents that are clear
about what they propose. If the goal is to improve performance by
lowering the security level of sequences of BFD packets, just say
so. (And I apologize in case I misunderstood document.)