On 14/10/2025 06:47, Ketan Talaulikar wrote:
Hi Gorry,

I would like to follow up on your DISCUSS and comments on this document. The authors have posted v35 of the document that clarifies what is meant by "optimizing". Can you check if that is now clarified and ok with you?

If not, then I would like to offer some suggestions (to you and the authors) to consider:

Lightweight BFD Authentication
CSPRNG Based BFD Authentication
Alternating BFD Authentication
Alternating Between Regular and Lightweight BFD Authentication

Thanks,
Ketan

Thanks Ketan, I see the improved abstract, and I do think this is helpful.

I am still unsure the present title is appropiate. I would still ask if a change of title us possible. From my understanding, which is limited to what I saw in the final document, I think any of these would be good.

I'd suggest either: Lightweight BFD Authentication or Alternating BFD Authentication

... but, I think others may understand better any sensititivies surrounding the title, so I will take advice from you, let's discuss briefly. I am now eager to close this DISCUSS and see the document published!

Gorry

(WIT AD)


On Mon, Aug 25, 2025 at 9:34 PM Gorry Fairhurst <[email protected]> wrote:

    On 25/08/2025 16:51, Jeffrey Haas wrote:
    > Gorry,
    Thank you for the very quick response.
    >> On Aug 25, 2025, at 10:33 AM, Gorry Fairhurst via Datatracker
    <[email protected]> wrote:
    >>
    ----------------------------------------------------------------------
    >> DISCUSS:
    >>
    ----------------------------------------------------------------------
    >>
    >> Thank you for the work put into this document. I have one topic
    that I'd like
    >> to discuss:
    >>
    >> ### 1. In the title and throughout the document, I a became
    little unsure about
    >> the words
    >>    optimized BFD authentication - The title worries me. I
    >>    think the words "optimised" could suggest stronger
    authentication, which
    >>    seems to me to not be the case, and hence this could be
    potentially
    >>    confusing because this is not really optimised for better
    authentication,
    >>    but a more lightweight implementation of authentication,
    which I understand
    >>    from the I-D is expected could also make authentication more
    easy to deploy,
    >>    which could have merit.
    > The term optimized is used in the dictionary sense as "improved"
    and not to imply "to make stronger".
    >
    > If there is text in the document that implies that this is
    otherwise, let's discuss that.

    GF: OK, I've stepped-up to have this discussion. I have no
    predetermined
    outcome that I wish to see happen at this time, except to discuss
    if we
    can find a "representative" title, and I agree that before we have
    that
    discussion, we ought to gather more IESG reviews.

    > During the lifetime of the optimized authentication and secure
    sequence number documents, there was an understood tension that
    some of the terminology would likely be in need of refinement when
    we reached IESG discussion.  As an example, we avoid using "strong
    authentication" because this will immediately give people reason
    for objection when MD5 and SHA-1 are used in that context; they
    are merely "stronger". Similarly, we avoid using "weak/weaker",
    "less strong",  and instead have focused on "less computationally
    intensive" even though it is clumsy.
    >
    > It is hopefully contextually clear when reviewing both the
    optimized authentication draft and the secure sequence numbers
    drafts together that the optimization is to use stronger
    authentication for state changes, and for the vast majority of BFD
    Up packets (the real work of the protocol) that we're providing a
    mode that permits those packets to use the less computationally
    intensive method to do their protocol work while at the same time
    not break the CPU budget.
    >
    > The IESG is welcome to recommend a cluster of terms that covers
    all of the related properties, especially if citably covered by
    appropriate terms of art.
    GF: Sounds good, and Ketan is currently the responsible AD.
    >
    >>
    ----------------------------------------------------------------------
    >> COMMENT:
    >>
    ----------------------------------------------------------------------
    >>
    >> Thanks for preparing this I-D, I have the following comments
    which I hope will
    >> help revise this I-D.
    >>
    >> ### 1. Thank you to Marcus Ihlar for his TSV-ART review, see:
    >>
    
https://datatracker.ietf.org/doc/review-ietf-bfd-optimizing-authentication-28-tsvart-lc-ihlar-2025-08-18/
    >>
    >> As noted in the reviwe, could the editors please add a short
    discussion on loss
    >> and reauthentication in Section 5, or in an Operational
    Considerations section?
    >>
    > See paragraph 2 of section 5 from version -29.  This "twice'
    section was added to address his comments.
    GF: Aha, that new text is helpful indeed.
    >
    >> ### 2. The I-D text ought to say why the document is
    experimental, please could
    >> you add to
    >>    the Introduction by citing the Appendix that explains this.
    > As noted elsewhere, the IESG as a whole should decide what they
    want here.  We've been through this dance multiple times with the
    routing-ADs and Ketan likely has the token at the moment.
    >
    > The short form of this is that the documents represent the
    consensus of a small number of individuals finishing this work in
    BFD with a desire to publish work that is likely valuable for
    future use, but has not yet been implemented.
    >
    > Once the IESG makes its determination about what boilerplate
    will satisfy it for this document cluster, we likely will just add
    it to all three documents.
    GF: All this is fine, but my particular request here was to add a
    cross-reference the appendix so a reader finds the appendix when they
    read the introduction. You could of course do more.
    >
    >> ### 3. The I-D currently states: "All BFD Control Packets with
    the states
    >> AdminDown, Down, and Init
    >>    require strong authentication." - could this be a RFC-2119
    requirement?
    >>    Please consider making this a nomative case for this I-D ,
    i.e. make this
    >>    "REQUIRES", or the REQUIRES in the following: "In addition
    to these
    >>    requirements, BFD "significant changes" require strong
    authentication."
    > [Note - these changes will be staged and pushed once review is
    complete]
    >         <t>All BFD Control Packets with the states AdminDown,
    Down, and Init
    > -      require strong authentication.</t>
    > +      MUST use strong authentication.</t>
    >
    GF: Thanks this would address that.
    >> ### 5. The I-D currently states:
    >>    "When using the less computationally intensive authentication
    >>    mechanism, BFD should periodically test the session using
    the strong
    >>    authentication mechanism."
    >>    - I'd agree, but I do think the text needs to explain why
    this is
    >>    desirable, i.e. to justify why people SHOULD think seriously
    about
    >>    enabling this test.
    > The other authors may have thoughts about appropriate text
    here.  I don't.
    >
    > The short form of this is that ISAAC, in the only specified
    optimized authentication mode we have at this point, is expected
    to be strong enough that we believe it's secure. The only
    motivation to periodically do strong authentication is "just in
    case".  Normative text for "just in case" isn't exactly compelling.
    GF: To be clear, I only ask to say briefly how the test helps
    (which it
    should), so a reader knows that they ought to follow the should.
    >> ### 6. The I-D currently states:
    >>    "Once
    >>    enabled, every packet must have Authentication Bit set and the
    >>    associated Authentication Type appended."
    >>    - Please cit the section here, I could not be sure what was
    cited?
    > -      associated Authentication Type appended. In addition, it
    states that an
    > +      associated Authentication Type appended (<xref
    target="RFC5880" section="4.1"/>).
    > +      In addition, it states that an
    GF: Thanks.
    >> ### 7. The I-D currently states:
    >>   "As a security precaution, it mentions that
    >>    authentication state be allowed to change at most once"
    >>    Whereas, RFC 5880 use RFC-2119 text:
    >>    "In order to avoid security risks, implementations using
    this method
    >>    SHOULD only allow the authentication state to be changed at
    most once
    >>    without some form of intervention."
    >>    - Could this RFC 5880 text be quoted as-is, in the current
    I-D (with a
    >>    reference?)
    > -      authentication as a one time operation. As a security
    precaution, it
    > -      mentions that authentication state be allowed to change
    at most once.
    > +      authentication as a one time operation.
    > +      "... implementations using this method SHOULD only allow the
    > +      authentication state to be changed at most once without
    some form of
    > +      intervention (so that authentication cannot be turned on
    and off
    > +      repeatedly simply based on the receipt of BFD Control
    packets from remote
    > +      systems)." (<xref target="RFC5880" section="6.7.1"/>)
    GF: Looks good to me.
    >> ### NiTs
    >> ====
    >>
    >> /It provides procedure where BFD state/It provides a procedure
    where BFD state/
    >> /describes enabling and disabling/describe enabling and disabling/
    >> /authentication state be allowed to change at most once/the
    authentication
    >> state be allowed to change at most once/
    >>
    > Accepted.
    >
    > -- Jeff

    Best wishes,

    Gorry

Reply via email to