Re: Request for WG adoption of draft-mahesh-bfd-authentication

"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Wed, 25 November 2015 08:01 UTC

Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E3081A01A8; Wed, 25 Nov 2015 00:01:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.249
X-Spam-Level:
X-Spam-Status: No, score=-0.249 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N-iyUf7wYZBO; Wed, 25 Nov 2015 00:01:32 -0800 (PST)
Received: from out4133-98.mail.aliyun.com (out4133-98.mail.aliyun.com [42.120.133.98]) by ietfa.amsl.com (Postfix) with ESMTP id 65B281A01A5; Wed, 25 Nov 2015 00:01:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1448438490; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=zeKFVJv+/GSyN3TbDQvXHFWuzkk6HWBBKNTIXEkl0sU=; b=AYMjJ2xgogNJVLc59GFL9NGRxRJVUEOpxwPupZf4ZflVU/4xYBp80SQxwXCwPMMr1FU+7W2VUnuwtKEbt1z4tAF1kYILfxQp33HcHXgsp2JHUNPjZPx/5faIuoX7oaIx/t/esuxrrJ68e7IHCj0DjMTW914beT37L+by5W2CbZs=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R971e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03312; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=8; SR=0; TI=SMTPD_----4GK--IR;
Received: from 30.9.190.8(mailfrom:dacheng.zdc@alibaba-inc.com ip:42.120.74.180) by smtp.aliyun-inc.com(127.0.0.1); Wed, 25 Nov 2015 16:01:24 +0800
User-Agent: Microsoft-MacOutlook/14.5.7.151005
Date: Wed, 25 Nov 2015 16:01:20 +0800
Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication
From: Dacheng Zhang <dacheng.zdc@alibaba-inc.com>
To: Loa Andersson <loa@pi.nu>, Gregory Mirsky <gregory.mirsky@ericsson.com>, Marc Binderberger <marc@sniff.de>, "Reshad Rahman (rrahman)" <rrahman@cisco.com>, "draft-mahesh-bfd-authentication@ietf.org" <draft-mahesh-bfd-authentication@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <D27B8888.303F3%dacheng.zdc@alibaba-inc.com>
Thread-Topic: Request for WG adoption of draft-mahesh-bfd-authentication
References: <D2747638.109021%rrahman@cisco.com> <20151121022956672568.a3e4948f@sniff.de> <D27A1EEE.300E7%dacheng.zdc@alibaba-inc.com> <7347100B5761DC41A166AC17F22DF11221947B4A@eusaamb103.ericsson.se> <D27A2E00.30120%dacheng.zdc@alibaba-inc.com> <7347100B5761DC41A166AC17F22DF1122194890E@eusaamb103.ericsson.se> <D27B6E5D.302E3%dacheng.zdc@alibaba-inc.com> <565561B6.8010207@pi.nu>
In-Reply-To: <565561B6.8010207@pi.nu>
Mime-version: 1.0
Content-type: text/plain; charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-bfd/8DzW1dtVYvWW0D2ccGTg8kQKDfQ>
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, Manav Bhatia <manav@ionosnetworks.com>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 08:01:34 -0000

Hi, Loa:

Thank you for the comments. No problem. Actually, there are two drafts for
strengthening BFD security:

https://tools.ietf.org/html/draft-ietf-bfd-generic-crypto-auth-06, which
specify a generic authentication mechanism for BFD.
https://tools.ietf.org/html/draft-ietf-bfd-hmac-sha-05, which discusses
how to support SHA2 based on the generic authentication extension.

The first draft has been adopted as a WG draft. So, it would be great for
the group to review it again and let us know if you have any comments.

Cheers

Dacheng


在 15-11-25 下午3:22, "Loa Andersson" <loa@pi.nu> 写入:

>Dacheng,
>
>Maybe do it the IETF way - discuss on the mailing list how it should
>be updated, when we have consesnsus - update draft, and then see if
>there is anything that we need to take up time to do at the f2f
>meeting :) !
>
>/Loa
>
>On 2015-11-25 13:57, Dacheng Zhang wrote:
>> Great! Let us update that draft and discuss it in the next IETF meeting.
>> ^_^
>>
>> Cheers
>>
>> Dacheng
>>
>> 在 15-11-25 上午9:33, "Gregory Mirsky" <gregory.mirsky@ericsson.com> 写入:
>>
>>> Hi Dacheng,
>>> HW became more capable and we, one hopes, wiser. Perhaps it's time to
>>> re-visit our options.
>>>
>>> 	Regards,
>>> 		Greg
>>>
>>> -----Original Message-----
>>> From: Dacheng Zhang [mailto:dacheng.zdc@alibaba-inc.com]
>>> Sent: Monday, November 23, 2015 11:12 PM
>>> To: Gregory Mirsky; Marc Binderberger; Reshad Rahman (rrahman);
>>> draft-mahesh-bfd-authentication@ietf.org; Stephen Farrell
>>> Cc: rtg-bfd@ietf.org
>>> Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication
>>>
>>>
>>>
>>> 在 15-11-24 下午2:46, "Gregory Mirsky" <gregory.mirsky@ericsson.com> 写入:
>>>
>>>> Dear All,
>>>> I'd like to share comment by Security AD Stephen Farrell on a work
>>>>that
>>>> is directly related to BFD, draft-ietf-mpls-lsp-ping-mpls-tp-oam-conf
>>>> (hope it is OK to raise security awareness in BFD community):
>>>>
>>>>> - 2.1.1, is there any chance of moving on from the "Keyed SHA1"
>>>>>
>>>>> from RFC5880 to e.g. HMAC-SHA256 for this? We're generally trying to
>>>>> get that kind of transition done as we can and moving to use of a
>>>>> standard integrity check rather than a more home-grown one has some
>>>>> benefits. The HMAC-SHA1-like thing you're doing is still probably ok,
>>>>> (though could maybe do with crypto eyeballs on it as there may have
>>>>> been relevant new results since 2010) but future-proofing would
>>>>> suggest moving to HMAC-SHA256 if we can. (I can imagine such a change
>>>>> might require a new document, but am asking anyway:-)
>>>>>
>>>>> GIM>> The fact is that we're bound by what is defined in RFC 5880.
>>>>
>>>> I wonder for how long though, that's now a five year old RFC.
>>>> Assuming it takes a few years for new deployments to pick up new
>>>> algorithms, isn't it time that a whole bunch of algorithm choices were
>>>> revisited?
>>>>
>>>>> There was a proposal to strengthen BFD security BFD Generic
>>>>> Cryptographic
>>>>> 
>>>>>Authentication<http://tools.ietf.org/html/draft-bhatia-bfd-crypto-auth
>>>>> -03
>>>>>> but the document had expired.
>>>>
>>>> Pity that.
>>>
>>> I am one of the co-author of that draft. We didn’t try to update
>>>document
>>> because we got the feedback from the group that the influence on the
>>> performance is a big concern. That is why I raised the question in the
>>> last email whether it is a good time for us to re-consider the usage of
>>> aha-2 in BFD.
>>>>
>>>
>>
>>