[Tsv-art] Tsvart last call review of draft-ietf-bfd-unsolicited-11

Magnus Westerlund via Datatracker <noreply@ietf.org> Mon, 14 November 2022 13:18 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: tsv-art@ietf.org
Delivered-To: tsv-art@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 55270C152599; Mon, 14 Nov 2022 05:18:04 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Magnus Westerlund via Datatracker <noreply@ietf.org>
To: tsv-art@ietf.org
Cc: draft-ietf-bfd-unsolicited.all@ietf.org, last-call@ietf.org, rtg-bfd@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 8.20.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <166843188434.3594.9962834681353025333@ietfa.amsl.com>
Reply-To: Magnus Westerlund <magnus.westerlund@ericsson.com>
Date: Mon, 14 Nov 2022 05:18:04 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/frMo15Xw7Mzp4CZrIqDv-V8E2PU>
Subject: [Tsv-art] Tsvart last call review of draft-ietf-bfd-unsolicited-11
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2022 13:18:04 -0000

Reviewer: Magnus Westerlund
Review result: Ready with Issues

This document has been reviewed as part of the transport area review team's
ongoing effort to review key IETF documents. These comments were written
primarily for the transport area directors, but are copied to the document's
authors and WG to allow them to address any issues raised and also to the IETF
discussion list for information.

When done at the time of IETF Last Call, the authors should consider this
review as part of the last-call comments they receive. Please always CC
tsv-art@ietf.org if you reply to or forward this review.

I have a couple comments focused around how to deal with overload or attacks
using unsolicited BFD.

1) Section 7.1
The formulations around the mitigations are poorly worded.
a) First the lead in to the bullet list states that this is mandatory but it
fails to use and RFC 2119/8174 words. b) "Limit the feature to specific
interfaces, and to single-hop BFD with "TTL=255"
     [RFC5082]." I would think that this sentence would rather state that one
     MUST use the RFC 5082 security mechanism for the BFD traffic. What is
     unclear to me from not having read RFC 5082 in detail is if this mechanism
     works well for this traffic or gets additional traffic into problems due
     to scoping which appear to be interface wide. Thus, are further
     clarifications on usage needed?
c) "Use BFD authentication, see [RFC5880]. In some environments, e.g. when
using an IXP, BFD authentication can not be used because of the lack of
coordination into the operation of the two endpoints of the BFD session. In
other environments, e.g. when BFD is used to track the next hop of static
routes, it is possible to use BFD authentication: this comes with the extra
cost of configuring matching key-chains at the two endpoints. If BFD
authentication is used, the Meticulous Keyed SHA1 mechanism SHOULD be used."
This mitigation usage is deployment dependent, thus better care in formulation
related to this is needed. This appears to be a MUST unless in this particular
situation and should be clearer. Also the actual support required for interop
appears a bit weak without having looked into RFC 5880 in detail. But only a
SHOULD support algorithm?

2) Not being an expert in BFD and its control parts it appears that there are
no mechanism for terminating an ongoing BFD session as the passive player in
case of any overload. It is even unclear if there are any other mechanism than
refusing to respond to a new session for the passive entity when getting
unsolicitied BFD. So it would be good if the document could be more explicit if
there are any action the passive entity can do if ending up with to many BFD
sessions? I understand the goal here is to limit the number of potential peers
as well as ensuring that they are trusted entities even before any packets are
sent, but are there really no method to stop the session?

3) Section 7.2:
So this section lays out the "knobs" that are sensitive. But it appears to not
really put any requirement on that one actually protects. Is this how things
usually are done i YANG modules?