Re: Request for WG adoption of draft-mahesh-bfd-authentication

"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Tue, 24 November 2015 07:12 UTC

Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 311651A015D; Mon, 23 Nov 2015 23:12:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.249
X-Spam-Level:
X-Spam-Status: No, score=-0.249 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W8Vxn_VV74Dy; Mon, 23 Nov 2015 23:12:34 -0800 (PST)
Received: from out4133-2.mail.aliyun.com (out4133-2.mail.aliyun.com [42.120.133.2]) by ietfa.amsl.com (Postfix) with ESMTP id 8D0DA1A0155; Mon, 23 Nov 2015 23:12:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1448349151; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=g6HD0WyIZwG6yRJzMJRP7k/PMOMaeDrnjysXmQaOcNA=; b=mflGyKLzZOwPgoAEvlT2ewDu+vXBXgxwCyxkmzRNXAzTATrlWQFhQfTC+NsFWyZeKsdB2dZ76tTTpAUqU6eIDBitNQ26s3lSS0HaNU/xHi19LPyxDOjqqtYgyJqmf73pwCqu8QGpVJXzJED3/q3g5lZZpF2W8jZGpHV37TzIpLw=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R781e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03283; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=6; SR=0; TI=SMTPD_----4FNmK30;
Received: from 10.62.54.19(mailfrom:dacheng.zdc@alibaba-inc.com ip:182.92.253.23) by smtp.aliyun-inc.com(127.0.0.1); Tue, 24 Nov 2015 15:12:24 +0800
User-Agent: Microsoft-MacOutlook/14.5.7.151005
Date: Tue, 24 Nov 2015 15:12:18 +0800
Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication
From: Dacheng Zhang <dacheng.zdc@alibaba-inc.com>
To: Gregory Mirsky <gregory.mirsky@ericsson.com>, Marc Binderberger <marc@sniff.de>, "Reshad Rahman (rrahman)" <rrahman@cisco.com>, "draft-mahesh-bfd-authentication@ietf.org" <draft-mahesh-bfd-authentication@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <D27A2E00.30120%dacheng.zdc@alibaba-inc.com>
Thread-Topic: Request for WG adoption of draft-mahesh-bfd-authentication
References: <D2747638.109021%rrahman@cisco.com> <20151121022956672568.a3e4948f@sniff.de> <D27A1EEE.300E7%dacheng.zdc@alibaba-inc.com> <7347100B5761DC41A166AC17F22DF11221947B4A@eusaamb103.ericsson.se>
In-Reply-To: <7347100B5761DC41A166AC17F22DF11221947B4A@eusaamb103.ericsson.se>
Mime-version: 1.0
Content-type: text/plain; charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-bfd/WrVTPgRgkRSZFqlR2n5J2r8RXDY>
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2015 07:12:38 -0000


在 15-11-24 下午2:46, "Gregory Mirsky" <gregory.mirsky@ericsson.com> 写入:

>Dear All,
>I'd like to share comment by Security AD Stephen Farrell on a work that
>is directly related to BFD, draft-ietf-mpls-lsp-ping-mpls-tp-oam-conf
>(hope it is OK to raise security awareness in BFD community):
>
>> - 2.1.1, is there any chance of moving on from the "Keyed SHA1"
>> 
>> from RFC5880 to e.g. HMAC-SHA256 for this? We're generally trying to
>> get that kind of transition done as we can and moving to use of a
>> standard integrity check rather than a more home-grown one has some
>> benefits. The HMAC-SHA1-like thing you're doing is still probably ok,
>> (though could maybe do with crypto eyeballs on it as there may have
>> been relevant new results since 2010) but future-proofing would
>> suggest moving to HMAC-SHA256 if we can. (I can imagine such a change
>> might require a new document, but am asking anyway:-)
>> 
>> GIM>> The fact is that we're bound by what is defined in RFC 5880.
>
>I wonder for how long though, that's now a five year old RFC.
>Assuming it takes a few years for new deployments to pick up new
>algorithms, isn't it time that a whole bunch of algorithm choices were
>revisited?
>
>> There was a proposal to strengthen BFD security BFD Generic
>> Cryptographic  
>>Authentication<http://tools.ietf.org/html/draft-bhatia-bfd-crypto-auth-03
>>> but the document had expired.
>
>Pity that.

I am one of the co-author of that draft. We didn’t try to update document
because we got the feedback from the group that the influence on the
performance is a big concern. That is why I raised the question in the
last email whether it is a good time for us to re-consider the usage of
aha-2 in BFD.
>