Analysis of Bidirectional Forwarding Detection (BFD) Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guidelines
RFC 7492
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
08 | (System) | Notify list changed from zhangdacheng@huawei.com, mjethanandani@gmail.com, manav@ionosnetworks.com, draft-ietf-karp-bfd-analysis@ietf.org to (None) |
2015-03-18
|
08 | (System) | RFC published |
2015-03-18
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-03-13
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-03-10
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2015-02-11
|
08 | Amy Vezza | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-02-10
|
08 | (System) | RFC Editor state changed to EDIT |
2015-02-10
|
08 | (System) | Announcement was received by RFC Editor |
2015-02-09
|
08 | (System) | IANA Action state changed to No IC |
2015-02-09
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2015-02-09
|
08 | Cindy Morgan | IESG has approved the document |
2015-02-09
|
08 | Cindy Morgan | Closed "Approve" ballot |
2015-02-09
|
08 | Cindy Morgan | Ballot approval text was generated |
2015-02-09
|
08 | Adrian Farrel | Ballot writeup was changed |
2015-02-09
|
08 | Adrian Farrel | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2015-02-09
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2015-02-09
|
08 | Manav Bhatia | New version available: draft-ietf-karp-bfd-analysis-08.txt |
2015-02-02
|
07 | Adrian Farrel | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup |
2015-01-20
|
07 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2015-01-20
|
07 | Mahesh Jethanandani | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2015-01-20
|
07 | Mahesh Jethanandani | New version available: draft-ietf-karp-bfd-analysis-07.txt |
2015-01-19
|
06 | Kathleen Moriarty | [Ballot comment] I agree with Stephen's comment and would also liked to have seen a better discussion in this draft on the issues. A more … [Ballot comment] I agree with Stephen's comment and would also liked to have seen a better discussion in this draft on the issues. A more complete discussion of vulnerabilities in the draft would have been helpful. I'll move my discuss to a comment with the same reasoning as STephen, that more analysis is needed… although I'm not sure of the value of this raft without that analysis. In addition to Stephen's points, I'd also like to highlight the following that came up during the SecDir review and has not been added into the draft: A discussion of algorithm agility would be helpful and expanding on limitations (if any) rather than just adding stronger hash algorithms. As Stephen points out, the computation factors may not be as bad as the author detailed in the draft from what we know of OpenSSL. The draft should also explain how it came to the following premise, that BFD needs to use algorithms that match the routing algorithm strength. It would be good to know if there is anything to it or not. Are the attack models aligned? Moving the routing protocols to a stronger algorithm while using weaker algorithm for BFD would allow the attacker to bring down BFD in order to bring down the routing protocol. BFD therefore needs to match the routing protocols in its strength of algorithm. Should we be bothering with this draft given the last comment in the SecDir review: Lastly, RFC5880 (the BFD spec) says: An attacker who is in complete control of the link between the systems can easily drop all BFD packets but forward everything else (causing the link to be falsely declared down), or forward only the BFD packets but nothing else (causing the link to be falsely declared up). This attack cannot be prevented by BFD. Link to SecDir review: https://www.ietf.org/mail-archive/web/secdir/current/msg04976.html |
2015-01-19
|
06 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss |
2014-08-25
|
06 | Gunter Van de Velde | Request for Telechat review by OPSDIR Completed: Has Issues. Reviewer: Tom Taylor. |
2014-08-21
|
06 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Sam Weiler. |
2014-08-21
|
06 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2014-08-21
|
06 | Kathleen Moriarty | [Ballot discuss] Sorry for the late discuss, the SecDir review came in late and Sam has a few questions that really should get addressed as … [Ballot discuss] Sorry for the late discuss, the SecDir review came in late and Sam has a few questions that really should get addressed as it has the potential to change the draft. It would be helpful to understand a few of the decisions and see if some of his suggestions assist with the options that the WG goes forward with. It may or may not apply, but would be helpful to discuss and understand that. Here is a link to the review: https://www.ietf.org/mail-archive/web/secdir/current/msg04976.html |
2014-08-21
|
06 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to Discuss from No Objection |
2014-08-21
|
06 | Ted Lemon | [Ballot comment] In 3: However, in the Meticulous Keyed MD5 and the Meticulous Keyed SHA-1 mechanisms, the sequence member is required to … [Ballot comment] In 3: However, in the Meticulous Keyed MD5 and the Meticulous Keyed SHA-1 mechanisms, the sequence member is required to monotonically increase with each successive packet. "monotonically increasing" means the same thing as "non-decreasing." That is, a for monotonically increasing function f, it is always true that f(x) <= f(x+k) for all positive values of k. I think you mean "strictly increasing." But really you could just say "is required to increase with each successive packet." Thanks for doing this analysis! |
2014-08-21
|
06 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2014-08-21
|
06 | Alia Atlas | [Ballot comment] This document could be strongly - both in describing the scaling issues for how BFD is run and the locality. For instance, the … [Ballot comment] This document could be strongly - both in describing the scaling issues for how BFD is run and the locality. For instance, the difference between BFD sessions for a one-hop session where the TTL can be trivially checked and the BFD sessions run at ms granularity vs. multi-hop sessions where they can be much slower. The document would really benefit from a section discussing deployment use-cases and discussing the attacks and appropriate mitigation in each of those scenarios. As written, I don't feel that the draft conveys much useful or actionable information and is more likely to be interpreted as not quite understanding realistic deployments - which is a pity. I am tempted to make this a discuss... |
2014-08-21
|
06 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2014-08-20
|
06 | Stephen Farrell | [Ballot comment] This is not a DISCUSS as I think more analysis is needed on the threats faced by BFD than is presented here (apologies … [Ballot comment] This is not a DISCUSS as I think more analysis is needed on the threats faced by BFD than is presented here (apologies if that's elsewhere and I'm ignorant) and a later solutions draft that doesn't do that can always attract a DISCUSS. Anyway, the point is that simply complaining that the current auth schemes don't work doesn't tell you what to fix. (Note: I am not saying that GMAC is the wrong answer, I'm saying that there's not enough presented here to know so a solution draft that says "look there - GMAC has to be right" could well attract such a DISCUSS.) As a separate general point, I have to say that this document doesn't explain to the reader why there's a real problem with crypto for BFD. And doing a HMAC in microseconds is not a problem - opennssl tells me that it takes about 8 microseconds for a hmac-md5 over 1024 bytes on my laptop in pure s/w - 10 milliseconds for 3 instances of HMAC is ages. I think you're neglecting here to say that there are 1000's of parallel sessions or something, but in any case, as presented, the timing constraints do not seem to be at all hard which makes the document less convincing that I believe ought be the case. (Note - I do believe from chatting with folks that there is some real problem with BFD security, but this document does not capture that well as far as I can see.) section 2: MD5 and SHA-1 are used with HMAC, right? With HMAC, collision resistance for the hash function is not the required property, but rather pre-image resistance and we don't know that SHA-1 is weak in that respect, and even HMAC-MD5 is still ok. There are still be good reasons to want new algorithms, but I don't think that lack of collision reisistance for hash function used in HMAC is one of them. section 3 says: "Echo packets are not defined in the BFD specification, though they can keep the BFD session up. The format of the echo packet is local to the sending side and there are no guidelines on the properties of these packets beyond the choice of the source and destination addresses." That seems really weird. The "add security but we're not saying how" that follows is even weirder. |
2014-08-20
|
06 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2014-08-20
|
06 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2014-08-20
|
06 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-08-20
|
06 | Joel Jaeggli | [Ballot comment] It would be helpful to distinguish between cases where a replay attack requires that you be on-link (e.g. some link-layer encapsulation) versus the … [Ballot comment] It would be helpful to distinguish between cases where a replay attack requires that you be on-link (e.g. some link-layer encapsulation) versus the cases such as ipv4/ipv6 maybe mpls that could potentially be injected /spoofed from offlink. |
2014-08-20
|
06 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2014-08-20
|
06 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-08-20
|
06 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-08-18
|
06 | Spencer Dawkins | [Ballot comment] Is this text: There are several requirements described in section 3 of The Threat Analysis and Requirements for Cryptographic Authentication of … [Ballot comment] Is this text: There are several requirements described in section 3 of The Threat Analysis and Requirements for Cryptographic Authentication of Routing Protocols' Transports [RFC6862] that BFD does not currently meet: still going to be true when it appears in an RFC? Perhaps “that BFD as defined in [RFC5880] does not meet”? or whatever the right reference would be … |
2014-08-18
|
06 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2014-08-18
|
06 | Scott Brim | Request for Telechat review by GENART Completed: Ready. Reviewer: Scott Brim. |
2014-08-18
|
06 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Tom Taylor |
2014-08-18
|
06 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Tom Taylor |
2014-08-15
|
06 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2014-08-14
|
06 | Jean Mahoney | Request for Telechat review by GENART is assigned to Scott Brim |
2014-08-14
|
06 | Jean Mahoney | Request for Telechat review by GENART is assigned to Scott Brim |
2014-08-14
|
06 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2014-08-14
|
06 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2014-08-14
|
06 | Adrian Farrel | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup |
2014-08-14
|
06 | Adrian Farrel | Ballot has been issued |
2014-08-14
|
06 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2014-08-14
|
06 | Adrian Farrel | Created "Approve" ballot |
2014-08-14
|
06 | Adrian Farrel | Placed on agenda for telechat - 2014-08-21 |
2014-08-14
|
06 | Adrian Farrel | Changed consensus to Yes from Unknown |
2014-08-13
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-08-13
|
06 | Mahesh Jethanandani | New version available: draft-ietf-karp-bfd-analysis-06.txt |
2014-08-13
|
05 | Adrian Farrel | Hello authors and shepherd, IETF last call has completed. Thanks for the update to address the Routing Directorate review from Les. I think you also … Hello authors and shepherd, IETF last call has completed. Thanks for the update to address the Routing Directorate review from Les. I think you also received some comments from Tom Taylor. They look minor, but you should still pick them up. Cheers, Adrian |
2014-08-13
|
05 | Adrian Farrel | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead |
2014-08-12
|
05 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2014-08-08
|
05 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Tom Taylor. |
2014-08-01
|
05 | Manav Bhatia | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2014-08-01
|
05 | Manav Bhatia | New version available: draft-ietf-karp-bfd-analysis-05.txt |
2014-07-30
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tom Taylor |
2014-07-30
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tom Taylor |
2014-07-27
|
04 | Scott Brim | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Scott Brim. |
2014-07-17
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Scott Brim |
2014-07-17
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Scott Brim |
2014-07-17
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sam Weiler |
2014-07-17
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sam Weiler |
2014-07-17
|
04 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2014-07-17
|
04 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-karp-bfd-analysis-04, which is currently in Last Call, and has the following comments: We understand that this document doesn't require … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-karp-bfd-analysis-04, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object. If this assessment is not accurate, please respond as soon as possible. |
2014-07-15
|
04 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2014-07-15
|
04 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Analysis of Bidirectional Forwarding Detection (BFD) … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Analysis of Bidirectional Forwarding Detection (BFD) Security According to KARP Design Guide) to Informational RFC The IESG has received a request from an individual submitter to consider the following document: - 'Analysis of Bidirectional Forwarding Detection (BFD) Security According to KARP Design Guide' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-08-12. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document analyzes the Bidirectional Forwarding Detection protocol (BFD) according to the guidelines set forth in section 4.2 of KARP Design Guidelines [RFC6518]. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-karp-bfd-analysis/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-karp-bfd-analysis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-07-15
|
04 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2014-07-15
|
04 | Adrian Farrel | Last call was requested |
2014-07-15
|
04 | Adrian Farrel | Ballot approval text was generated |
2014-07-15
|
04 | Adrian Farrel | IESG state changed to Last Call Requested from AD Evaluation |
2014-07-15
|
04 | Adrian Farrel | Last call announcement was changed |
2014-07-15
|
04 | Adrian Farrel | Last call announcement was generated |
2014-07-15
|
04 | Adrian Farrel | Last call announcement was generated |
2014-07-15
|
04 | Adrian Farrel | Ballot writeup was changed |
2014-07-15
|
04 | Adrian Farrel | Ballot writeup was generated |
2014-07-15
|
04 | Adrian Farrel | IESG state changed to AD Evaluation from Publication Requested |
2014-07-02
|
04 | Adrian Farrel | Assigned to Routing Area |
2014-07-02
|
04 | Adrian Farrel | Note added 'Processing as AD Sponsored as KARP working group has closed down.' |
2014-07-02
|
04 | Adrian Farrel | Intended Status changed to Informational |
2014-07-02
|
04 | Adrian Farrel | IESG process started in state Publication Requested |
2014-07-02
|
04 | (System) | Earlier history may be found in the Comment Log for /doc/draft-bhatia-zhang-karp-bfd-analysis/ |
2014-07-01
|
04 | Brian Weis | Changed document writeup |
2014-07-01
|
04 | Brian Weis | Changed document writeup |
2014-06-26
|
04 | Dacheng Zhang | New version available: draft-ietf-karp-bfd-analysis-04.txt |
2014-06-19
|
03 | Mahesh Jethanandani | New version available: draft-ietf-karp-bfd-analysis-03.txt |
2014-05-30
|
02 | Cindy Morgan | Changed field(s): group,abstract |
2014-05-29
|
02 | Brian Weis | Document shepherd changed to Brian Weis |
2014-05-22
|
02 | Mahesh Jethanandani | New version available: draft-ietf-karp-bfd-analysis-02.txt |
2013-09-10
|
01 | Dacheng Zhang | New version available: draft-ietf-karp-bfd-analysis-01.txt |
2013-03-11
|
00 | Dacheng Zhang | New version available: draft-ietf-karp-bfd-analysis-00.txt |