Re: ttl and authentication
Dave Katz <dkatz@juniper.net> Thu, 24 February 2005 06:41 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA07392; Thu, 24 Feb 2005 01:41:31 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D4D3Z-0001Vw-W8; Thu, 24 Feb 2005 02:05:09 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D4Beb-0000YS-Pe; Thu, 24 Feb 2005 00:35:14 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D4BeZ-0000Xt-OW for rtg-bfd@megatron.ietf.org; Thu, 24 Feb 2005 00:35:11 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA14331 for <rtg-bfd@ietf.org>; Thu, 24 Feb 2005 00:35:08 -0500 (EST)
Received: from colo-dns-ext2.juniper.net ([207.17.137.64]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D4C1P-0002nQ-Py for rtg-bfd@ietf.org; Thu, 24 Feb 2005 00:58:48 -0500
Received: from merlot.juniper.net (merlot.juniper.net [172.17.27.10]) by colo-dns-ext2.juniper.net (8.12.3/8.12.3) with ESMTP id j1O5Z1Bm019749; Wed, 23 Feb 2005 21:35:02 -0800 (PST) (envelope-from dkatz@juniper.net)
Received: from [172.16.12.139] (nimbus-sf.juniper.net [172.16.12.139]) by merlot.juniper.net (8.11.3/8.11.3) with ESMTP id j1O5Z0e11659; Wed, 23 Feb 2005 21:35:00 -0800 (PST) (envelope-from dkatz@juniper.net)
In-Reply-To: <Pine.LNX.4.61.0502232111590.6499@netcore.fi>
References: <200502222036.PAA16786@ietf.org> <Pine.LNX.4.61.0502232111590.6499@netcore.fi>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-Id: <eb091c568763bfdd10f3c04ae3c9677c@juniper.net>
Content-Transfer-Encoding: 7bit
From: Dave Katz <dkatz@juniper.net>
Date: Wed, 23 Feb 2005 22:34:59 -0700
To: Pekka Savola <pekkas@netcore.fi>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7baded97d9887f7a0c7e8a33c2e3ea1b
Content-Transfer-Encoding: 7bit
Cc: rtg-bfd@ietf.org
Subject: Re: ttl and authentication
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
Sender: rtg-bfd-bounces@ietf.org
Errors-To: rtg-bfd-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb
Content-Transfer-Encoding: 7bit
On Feb 23, 2005, at 12:15 PM, Pekka Savola wrote: > If I interpret this correctly, the routers can not simply drop BFD > session which are sent to the router with a bogus TTL and bogus > authentication (e.g., wrong password) based on the TTL check? I should have been a bit more specific here. The intent was that an appropriately authenticated packet needn't be "authenticated" based on the TTL. I don't quite understand your concern; obviously if the packet fails authentication, it must be discarded, so it's not as though the MUST NOT language forces you to accept the packet. Whether this change is gratuitous or not is a separate issue; regardless, I don't see it as dangerous. I suppose "not good" could be equivalent to "gratuitous" but this doesn't rate an "ASAP." > > For single hop scenarios, I don't see the reason to omit checking for > TTL or to send any other TTL than 255. Please elaborate or put it > back in ASAP :). The reason I made this change is that the TTL hack isn't necessary when packets are authenticated, and I've never been thrilled with the TTL hack, and I'm concerned that the idea of "single hop" is somewhat fluid, so I wanted to make sure that BFD could work even if "single hop" and "TTL isn't decremented" aren't congruent. There is no specific case that I can think of that would make this fail (though there have been ideas floated over the years about reaching into encapsulated packets and decrementing the TTL) but it left me somewhat queasy. This is an incompatible change relative to the last draft, which also leaves me a bit queasy, but less queasy than the not making the change. If there are strong feelings that this shouldn't change, I am happy to remove it. I will make the language more specific in any case. --Dave
- I-D ACTION:draft-ietf-bfd-multihop-01.txt Internet-Drafts
- ttl and authentication [Re: I-D ACTION:draft-ietf… Pekka Savola
- Re: ttl and authentication Dave Katz
- Re: ttl and authentication Pekka Savola
- Re: ttl and authentication Dave Katz
- Re: ttl and authentication Pekka Savola
- Re: ttl and authentication Dave Katz