Re: Request for WG adoption of draft-mahesh-bfd-authentication

Mahesh Jethanandani <mjethanandani@gmail.com> Wed, 25 November 2015 17:35 UTC

Return-Path: <mjethanandani@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 058EA1A6FEE; Wed, 25 Nov 2015 09:35:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QxjuevjKJjlr; Wed, 25 Nov 2015 09:35:01 -0800 (PST)
Received: from mail-ob0-x22f.google.com (mail-ob0-x22f.google.com [IPv6:2607:f8b0:4003:c01::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7205E1A6FE2; Wed, 25 Nov 2015 09:35:01 -0800 (PST)
Received: by obbww6 with SMTP id ww6so44244479obb.0; Wed, 25 Nov 2015 09:35:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=kv4Zz5Ps2nui6NKcsHc8QjLzEdVyW/STYzvERhJPq/M=; b=YfleYmtctw0z5GoKXg+TejcoObUBbJsPDmN4r5813vaHMwZptYb7GXRDuG1fDXY9YM Q/F+pfZYUHOSoVEeLFcAmyUIxZIh+xmhedTkqPv0nEBu7g0ZAtKwJD4nEOhfH0FLGGyO 8uaQh+X0d76wHPPnwDCuouxg5XnyvdNSruIOtNHHDRfPWJPKyxFf37iB/5umDgiZlF2G 8fpt5+jFTwxEZS7BkW3WSHmx06s83jqtOdq3MGH1qfql7SnZdaycvFjrXCrgVeDVP9U+ WjfDCxafHtgCiOYeFzWj1YpkncFpezE7SB1IjFTMmlmVtduuDwTVQ6a10P01pPUtYyYj 448Q==
X-Received: by 10.182.213.7 with SMTP id no7mr11369933obc.22.1448472900813; Wed, 25 Nov 2015 09:35:00 -0800 (PST)
Received: from mahesh-m-62at.attlocal.net ([2602:306:cf77:df90:58b1:d513:c0e5:2a1c]) by smtp.gmail.com with ESMTPSA id w84sm11027156oiw.22.2015.11.25.09.34.58 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 25 Nov 2015 09:34:59 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_901B0327-DB13-4981-8E24-582F12DC2840"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication
From: Mahesh Jethanandani <mjethanandani@gmail.com>
In-Reply-To: <D27A74CD.10520C%rajeenai@cisco.com>
Date: Wed, 25 Nov 2015 09:34:56 -0800
Message-Id: <ED7433C2-8198-4D82-87BF-4F4FEA94080A@gmail.com>
References: <D2747638.109021%rrahman@cisco.com> <D27A74CD.10520C%rajeenai@cisco.com>
To: "Rajeev G Nair (rajeenai)" <rajeenai@cisco.com>
X-Mailer: Apple Mail (2.2098)
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-bfd/bkK77xva007fR5Uj7JA2sSdDFMM>
Cc: "Reshad Rahman (rrahman)" <rrahman@cisco.com>, "draft-mahesh-bfd-authentication@ietf.org" <draft-mahesh-bfd-authentication@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 17:35:04 -0000

Rajeev,

See comments inline.

> On Nov 24, 2015, at 8:42 PM, Rajeev G Nair (rajeenai) <rajeenai@cisco.com> wrote:
> 
> Jeff & Reshad, 
> 
>  Read through the document. Interesting concept.
> 
> Here is my understanding:-
>  1) Current scheme. Both switches are configured to use same auth. Currently, no packets will be accepted unless all received pkts match with configured auth.
>  2) Proposal is to come up with a scheme to authenticate only a subset of packets (those signaling a state change as mentioned). 
> 
> Questions:-
> Q1) Doesn't acceptance of non-auth packets dictates state of the session (e.g. Keep it still up UP) ?

There are a few aspects of the proposal that mitigate such a situation. The scenario you are describing is that the session has actually gone down but non-auth packets keep it up.

- The authenticated packet that brings the session down would have to be trapped and dropped by MiM.
- The sequence number of the subsequent UP packets would have to correspond to the next expected sequence number.
- The occasional authentication of three UP packet would have to pass the test by MiM.

> 
> Q2) These non-auth packets are not protected from MiM attacks, right?

See above.

> 
> Q3) Doesn’t mixing authenticated & non-authenticated packed make proposed scheme equivalent to non-authenticated mode ? I mean, unless every packet is authenticated, isn’t benefit of bfd-auth nullified ? 

Not really. The whole idea behind the proposal is that state transitions are significant in BFD, come at a slower interval and should be authenticated. Most other packets are liveliness check packets, and their authentication is not significant. They come at a fast interval (the defined interval), inundate the authentication capability of the system, but do not affect the state of the session, other than when they are dropped. Intentional or unintentional dropping of packets indicates a problem, but their authentication does not convey any more information.

Even if MiM was to take over a session, it can at best replay a few of the UP packets till it hits the next set of occasional authenticated UP packet or it hits a authenticated state transition packet. At that point it gets exposed.

Preserving the authentication system for state transition packet and occasional UP packets allows one to scale not only the number of BFD sessions, but also allows us to introduce a stronger form of authentication.

> 
> 
> thanks
> ~Rajeev
> 
> From: Rtg-bfd <rtg-bfd-bounces@ietf.org <mailto:rtg-bfd-bounces@ietf.org>> on behalf of "Reshad Rahman (rrahman)" <rrahman@cisco.com <mailto:rrahman@cisco.com>>
> Date: Friday, November 20, 2015 at 4:03 AM
> To: "rtg-bfd@ietf.org <mailto:rtg-bfd@ietf.org>" <rtg-bfd@ietf.org <mailto:rtg-bfd@ietf.org>>, "draft-mahesh-bfd-authentication@ietf.org <mailto:draft-mahesh-bfd-authentication@ietf.org>" <draft-mahesh-bfd-authentication@ietf.org <mailto:draft-mahesh-bfd-authentication@ietf.org>>
> Subject: Request for WG adoption of draft-mahesh-bfd-authentication
> 
> BFD WG members,
> 
> Please indicate to the WG mailing list whether you would support or not support BFD WG adoption of the following document.
> 
> https://datatracker.ietf.org/doc/draft-mahesh-bfd-authentication/ <https://datatracker.ietf.org/doc/draft-mahesh-bfd-authentication/>
> 
> Authors, as was mentioned at IETF94, you should get your proposal reviewed by the security group.
> 
> Regards,
> Jeff & Reshad.

Mahesh Jethanandani
mjethanandani@gmail.com