Re: I-D Action: draft-ietf-bfd-optimizing-authentication-14.txt

Reshad Rahman <reshad@yahoo.com> Thu, 08 February 2024 04:25 UTC

Return-Path: <reshad@yahoo.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43EC7C14CE30 for <rtg-bfd@ietfa.amsl.com>; Wed, 7 Feb 2024 20:25:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z-Mdl6wAAMVj for <rtg-bfd@ietfa.amsl.com>; Wed, 7 Feb 2024 20:25:17 -0800 (PST)
Received: from sonic317-27.consmr.mail.bf2.yahoo.com (sonic317-27.consmr.mail.bf2.yahoo.com [74.6.129.82]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD574C14F74E for <rtg-bfd@ietf.org>; Wed, 7 Feb 2024 20:25:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707366315; bh=g4qs9QfexI6sNB5aBOigrvbGvBr36o2etgRHcU5vNCI=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:From:Subject:Reply-To; b=AOPaV0a+84d5ISTIdPs3oluHdq+7Gf/P0Bsr9q2qwU4EeiqOCTe6hXyHp6+zcwSGWl9SjRV7AinkPatNZ6bTo/ObbKUgUPQ7Xz2gpNDLwLa1W2gsclKjoZU0JeAgOgGOfQaZu/1GC7Q3zO5MfnzkzTAaCnvUIp31dVzlObMTWmyyWmHqXDNo+Lje6QZidA+9OGoKmdtOBpWSgwR/6tbVeT31WWtj241A4TstzLeqKCBAF+D95SOUKWpfImagih8sUHYqKhYap5wzD+38fHpmy/WhUJa8OVqBqX36MEtQeoI4/eEH/JYmYwEMcTrwiFzeraVNWBVdrOM+3/24jfZXOQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707366315; bh=yJqz/yowd9eR6wN4L2kD8d2aR55A6LPHZ1APcyyZKDu=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=bM7HHzQ3KQNwOpf22+vpno6GxkRz4tZg6kHJOuccbCfsX1lt8YzTev1Fdr4tvl3/5GYEpa7SYCVUlq8lJJpWddjRHQYW4Unt/uOVvDzTYBM2gxdnTAoYwKJG2xpbXn9+tNoEarizcltYb+lPL4K4eM4roi+DfHaEPk7O+nEvGvc58jzTx+2i+WVWeMNV5Uwi9ZFEjyhFUm/HmDNw4q5dVO+pdGhcP/7UHm/Mqm6f4rezj87LZbf9JZGI5QH2eYRkWOFC8t7NkJfrKxzcA6PAjF2OCHXimhkYLoBjIjCMmi71zf941nZ/zuvueCG/TI1Y/FqBfgLDCZPs+iNMPAO8HQ==
X-YMail-OSG: GhGNxVQVM1k4uVnjBeW1xT6gisf6bvlgyMO0gEcYnrxlkwcRlF453RmSN_ohoDB 8O8TgP1m7elJwNAbmSt4Cb3pjMW2KLo5CbcAB5c_ButfptHI32nAMRzaOm9FvcvRqHz3PlNElgty rC57yUAq538n6INjF4ceDwFXDXkvpgR2iCck4Cl7JS2kkEwm_D29fYWeMgYmIvJ_quQFsmSfIN8R qUO2uVf7R8cPhQdrZ8y5svPfuP9CC8rVcgC2kQ4iVO0LbaBP0XD.RAv_2l6cuyURVxrCVxYgmOM6 8mtYXn1V0L4mT.kekMiAPmcPEOoWqqeaH3kKxHbpmUxBMjovkuDbtvfoV806Yh.XwrJqeKMPzizC KAudYs7B1O2dpp_yj2XKrf83QCXQBmTVQ5.sM9kJ2loOMqSKXtS8QM4OAOVM1oAuBPOt75m8RLV2 ew9HwqAOz0_mktBgQKwIavLZcZGnEu9fb0_fGE4uW2izDhHv0z8HEaIf4sMXxUhuzH2dovi7El5u hdj28I0R7aM.Q8YMwMfxBwCJteDCswDKgO1VZmu0rFVssTuNptcd10AP1cuENpywFG1XMKhF28GA mReXzarIAlXJiyawAjOarnx_WVaFzg5zLNIHgE7obq3TGxY6rkc6yMgQdiOy_LhKZHZXDnT5sf40 sefGg1RlIRyL7B4Q5ibZqCzVLq9Lnm0aQk3NvFheJhwNlTzmmfRQiNYmZHJkIyvcPXbR9XT5RaJR 0o_VCZ7EA_CE4GONIb8wJZCGwhflk_yrrK06M0faSG4pdpJXK8DqWWekN9kPJ.yj9KNzw61iNiqP _bY1nxpLcqqtVPV9ju47ng.cwaVtQbFU40k3P7YpYEOim5KKKZ_5flIYmmWpmQHLkxAJezNER2Hx qpnzp.XldO9VHNqMVg1u.qQKiAcddPwHWvDiCI_DHYzsedtP_Isj3m2gnUYA13UFwtGtDNRo0RJ6 oFwoL.OafmrOuhF0TBMcmcxwLyDLVbSZhR3xURLId..yB9o2a5puVVh5493slvhShBurMREpnncz 9FHru3RUjJn9aCaoqtDhZ9yACZK0cmR5w0obXyMGGu573bgiUHpbXN63HEgPbob1ZjPGBQrFMX5n Mg1ihgpF.fE.PdXPLj6w7tUqXfigSZMT0SDUQncFNnNHC949OXXkaG3_YrG7YenGIcylcjxKTO4X 9gdYTFeIljcVnw3SPb4vK82kISNAVr8XaqIRJrsqgrdvH33hLwGpjf.GOlMIM3W8cSQmXmRgYOYm 6fE5tgaKyAZo5WNFd_R5WhSq4PST9OUXYcaH6qUoqo8MpK2RWo2T5oOcaFEq5Lvj8QaiHitREX9z GHGyt0UyzUBZQaFVJ4qtDdWuFv6wJTRuauAMItUCm12kgdfQ62lp1.kWgLH0yy7KI29t5gI8qq7f .pt3b6kQ2suDC6wCCsVlqbh.xTnPdAxLcOWO_i3__djC92E0Qp21agRhYsfS7C_Npr9HIb8IEVVF AvezKaFK2dDtAbeBqZToFy1vgKbXETcLUkARqE_cScJuGnJsqfAR_9wzgi5A1kStAYZNLLtpDtvJ 9GamcPv4eCQNFqS7iCCJGxQLLlgwAmoaHV9cJTkh_QNSAk.9X4FQk_NgeuRgD7ZwGAnSIeGfeh9W FgAtvAte1EZHvkFplchpq1W45n9HKPCuPQdRCOvy9HPa9eGC0vN_cvqY3PD25LB9GqoMFkRCGyrA 7PT0ZSTdewo0trJF1Y2wAvsBJ4orka0aPnZQXFZ39sclRK22iDV7pkmbQBiApYntfm5BFkHhydTV wbuEytRy4VyYOONYZQOav5B6Xx.M7rUeYVFEIeJpjZx.213WQ.hFVYsRiXiHu.lkKMwB99V2vFAc DW.B12rVpKuDuJGY3hXsuq1d.PqBmIoW68KqZ.5eIoJA0Qb94aZFjU085ZHHavc9Gs9gxpFl34J4 n7ULoODVgfICSMJOs4t3aaJCHs2T00VenFcFAEjhZrTUySMIz6VRxTEWwsExe0IIBHlATQpRU2AA UQ13Fl6ABVf7lGeS0bB4N7CiTjfTSZUUXP2PMAfxHSwn5JC5ceymk3GnQPP_gcjVxGIhoy7pTCza 82DWLbOFrtJovuqccKgjcydXrM.Lm1O9n1qYQVleBOz4IAx7gaDjaNWRKZRLHMLwmuiEzGbYRnzP Y0U_rjIUVLf9t7IzNJLo_NfdCnbTceQj8nfCCpsRekrZS1HLdWjptgVUCpcttrCTzHmgTjwEhzMb .70NsXuxh.dHciBXP7xz0K3tDgIsgdcXBUoJ8VXiO4VSExQUhJIMDWXD3jGEdKIKwl4WmNUOdG2u OTRT2BH5LKakjKkfYlLqPA3nOzyD20KmwXhr_qtdvTXX6
X-Sonic-MF: <reshad@yahoo.com>
X-Sonic-ID: 6ef507ce-a28d-4f87-9c3a-3dbfa60f14e6
Received: from sonic.gate.mail.ne1.yahoo.com by sonic317.consmr.mail.bf2.yahoo.com with HTTP; Thu, 8 Feb 2024 04:25:15 +0000
Date: Thu, 08 Feb 2024 04:25:12 +0000
From: Reshad Rahman <reshad@yahoo.com>
Reply-To: Reshad Rahman <reshad@yahoo.com>
To: Jeffrey Haas <jhaas@pfrc.org>
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "draft-ietf-bfd-optimizing-authentication@ietf.org" <draft-ietf-bfd-optimizing-authentication@ietf.org>
Message-ID: <1496025559.3794166.1707366312558@mail.yahoo.com>
In-Reply-To: <307EE080-C45B-43F0-8A25-CF6968AD95B6@pfrc.org>
References: <170715329090.58811.17747021549116181763@ietfa.amsl.com> <1703157988.3118868.1707167897162@mail.yahoo.com> <307EE080-C45B-43F0-8A25-CF6968AD95B6@pfrc.org>
Subject: Re: I-D Action: draft-ietf-bfd-optimizing-authentication-14.txt
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_3794165_773345703.1707366312552"
X-Mailer: WebService/1.1.22046 YMailNorrin
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/9fbP672mn-EYwNYLrOU6OyU0z6s>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Feb 2024 04:25:19 -0000

 Hi Jeff,
    On Tuesday, February 6, 2024, 08:41:12 AM EST, Jeffrey Haas <jhaas@pfrc.org> wrote:  
 
 Reshad,


On Feb 5, 2024, at 4:18 PM, Reshad Rahman <reshad=40yahoo.com@dmarc.ietf.org> wrote:
 Hi,
I've provided some comments to the authors privately, sharing them here to restart/continue the discussion on the WG alias.
My main technical concern is in the changes to BFD auth mode: when transitioning to No auth for up packets, we don't know if the other end supports procedure changes from this document. So the other end could just drop the unauthenticated UP packets and the session will go down, eventually go back up, in a loop. The counter-argument which has been made is that this issue isn't new e.g. if one end is misconfigured for BFD auth, the session will not come up, so this boils down to being a typical config issue. I do agree partially, but I think the changes in this document can make things worse than usual in that the session will come up, go down very quickly and keep on ding that. We don't have any room left in the BFD header to indicate the desired behaviour. The only thing I could think of is to use Poll sequence with A=0 (on top of the expected A=1 packets), and transition to only A=0 if the Poll sequence succeeds (and the Poll sequence has to be for N packets where N is equal to "remote multiplier"). Jeff has pointed out that Xiao Min has suggested a similar solution in https://datatracker.ietf.org/doc/html/draft-xiao-bfd-padding-alteration-00.

Related notes from those conversations for the mailing list:
- A poll mechanism to test for a new behavior where the possibility exists for the poll packets to be lost means you have to be mindful of Detect Mult (permitted number of lost packets) and timers.  For example, a one packet poll is enough to probe if the packet isn't lost in either direction.  In case of loss, you don't want to do the poll for Detect Mult packets because if the drop is the result, the session goes down.
Mitigations may include temporarily changing the Detect Mult.
- One mitigation for the repeatedly bouncing sessions is to have the BFD session keep state.  If the implementation switches to optimized mode and the session drops, don't permit the session to automatically restart if it does this after more than X tries.  Require the operator to clear the state?
<RR2> Requiring operator to clear the state is fine in e.g. a lab environment. But in a prod env where opt-auth could be enabled on 1 side by mistake, I'd rather we find a way to handle that automatically in the protocol.
Other questions on section 2: - In paragraph 2, does this new procedure of accepting unauthenticated packets on a receiver apply even if opt-auth is disabled on the receiver (but is a supported feature)?- It would be interesting to walkthrough the sequence to upgrade a BFD session from Auth to opt-auth. Both ends can not be configured simultaneously, so I *think* this answers my question above.
Would an early review e.g. by ops, help to catch issues?


In terms of editorial comment, I am now questioning the term NULL auth since we also use the term No auth. Suggestions: Meticulous sequence number, sequence number or something along those lines.
YANG comments/questions/suggestions:
     identity no-auth {
       base key-chain:crypto-algorithm;<RR> It is a bit odd to have a crypto algorithm which says none. I wonder if a boolean would have been better to indicate no-auth.

We're looking for consistency in configuration.
If optimized procedures require another mechanism to be chosen for the optimized Up side of things, and that's done via the keychain, you need a valid keychain entry.
Further, properties such as "when is this valid" and other keychain properties are still valid.




     identity null {
       base key-chain:crypto-algorithm;<RR> null-auth to be consistent with no-auth (assuming we keep NULL auth)?

If we don't change the name, sure.


       leaf reauth-interval {         when "../optimized-auth = 'true'";         type uint32;         units "microseconds";<RR> I think it's overkill to have this in microsecs. Other intervals use micro secs because we exchange timer values in micro secs. This value is not exchanged so we don't need microsecs. Or are you doing this for consistency?

This is a headache elsewhere in YANG modules.  While the units clause lets us be clear that leaf A and leaf B aren't directly comparable if they don't share the units, it still trips people up.
That said, it's also not forbidden.  re-auth on the interval of seconds seems reasonable to me.
And, as I mentioned in a prior thread, the 60 second value that's been chosen is rather arbitrary.

<RR> Mention that value of 0 means that we don't do periodic reauth with strong authentication.

We could probably do that, especially in support of ISAAC procedures.



       leaf up-auth-type {<RR> Since this points to a key-chain, rename to something like opt-auth-key-chain?

Also reasonable.  The move to the "opt" name token in the draft is largely over the most recent discussion.

         type key-chain:key-chain-ref;         must "(../optimized-auth = 'true') and " +              "(../bfd-ip-sh:meticulous = 'true')";<RR> Why the check for meticulous? Is the reasoning that for non-meticulous opt-auth isn't needed or is it something else?

The optimized procedures require meticulous authentication.  The NULL and ISAAC methods use this mode to prevent PITM.  If you don't regularly increment the numbers, you're defining the interval in which the "attack" (silly as it is to some people) can happen.



         description           "The authentication type that should be used once the            connection transitions to Up state. In case <RR> Why in case? Isn't this only for optimized auth?

What wording would you prefer for "select this type for this mode"?
<RR2> I am just not groking the "in case of optimized auth". Ignore if it's just me.IIUC, based on the other thread, NULL auth will be removed from the description below?
Regards,Reshad.

            of optimized auth, the choices are Reserved (or no             authentication), NULL Auth, or Meticulous Keyed ISAAC.";       }       description         "Augment the 'bfd' container to add attributes related to BFD <RR> The 'authentication' container? Same below          optimized authentication.";     }
Regards,Reshad.


    On Monday, February 5, 2024, 12:14:55 PM EST, internet-drafts@ietf.org <internet-drafts@ietf.org> wrote:  
 
 Internet-Draft draft-ietf-bfd-optimizing-authentication-14.txt is now
available. It is a work item of the Bidirectional Forwarding Detection (BFD)
WG of the IETF.

  Title:  Optimizing BFD Authentication
  Authors: Mahesh Jethanandani
            Ashesh Mishra
            Ankur Saxena
            Manav Bhatia
  Name:    draft-ietf-bfd-optimizing-authentication-14.txt
  Pages:  26
  Dates:  2024-02-05

Abstract:

  This document describes an optimization to BFD Authentication as
  described in Section 6.7 of BFD RFC 5880.  This document updates RFC
  5880.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-bfd-optimizing-authentication/

There is also an HTMLized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-bfd-optimizing-authentication-14

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-bfd-optimizing-authentication-14

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts