Skip to main content

Analysis of Bidirectional Forwarding Detection (BFD) Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guidelines
draft-ietf-karp-bfd-analysis-08

Revision differences

Document history

Date Rev. By Action
2015-03-18
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2015-03-13
08 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-03-10
08 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2015-02-11
08 Amy Vezza IESG state changed to RFC Ed Queue from Approved-announcement sent
2015-02-10
08 (System) RFC Editor state changed to EDIT
2015-02-10
08 (System) Announcement was received by RFC Editor
2015-02-09
08 (System) IANA Action state changed to No IC
2015-02-09
08 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2015-02-09
08 Cindy Morgan IESG has approved the document
2015-02-09
08 Cindy Morgan Closed "Approve" ballot
2015-02-09
08 Cindy Morgan Ballot approval text was generated
2015-02-09
08 Adrian Farrel Ballot writeup was changed
2015-02-09
08 Adrian Farrel IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2015-02-09
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2015-02-09
08 Manav Bhatia New version available: draft-ietf-karp-bfd-analysis-08.txt
2015-02-02
07 Adrian Farrel IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup
2015-01-20
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2015-01-20
07 Mahesh Jethanandani IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2015-01-20
07 Mahesh Jethanandani New version available: draft-ietf-karp-bfd-analysis-07.txt
2015-01-19
06 Kathleen Moriarty
[Ballot comment]
I agree with Stephen's comment and would also liked to have seen a better discussion in this draft on the issues.  A more …
[Ballot comment]
I agree with Stephen's comment and would also liked to have seen a better discussion in this draft on the issues.  A more complete discussion of vulnerabilities in the draft would have been helpful.  I'll move my discuss to a comment with the same reasoning as STephen, that more analysis is needed… although I'm not sure of the value of this raft without that analysis.

In addition to Stephen's points, I'd also like to highlight the following that came up during the SecDir review and has not been added into the draft:

A discussion of algorithm agility would be helpful and expanding on limitations (if any) rather than just adding stronger hash algorithms.  As Stephen points out, the computation factors may not be as bad as the author detailed in the draft from what we know of OpenSSL.

The draft should also explain how it came to the following premise, that BFD needs to use algorithms that match the routing algorithm strength.  It would be good to know if there is anything to it or not.  Are the attack models aligned?
  Moving the routing protocols to a stronger algorithm while using
  weaker algorithm for BFD would allow the attacker to bring down BFD
  in order to bring down the routing protocol.  BFD therefore needs
  to match the routing protocols in its strength of algorithm.

Should we be bothering with this draft given the last comment in the SecDir review: Lastly, RFC5880 (the BFD spec) says:
  An attacker who is in complete control of the link between the
  systems can easily drop all BFD packets but forward everything else
  (causing the link to be falsely declared down), or forward only the
  BFD packets but nothing else (causing the link to be falsely
  declared up).  This attack cannot be prevented by BFD.

Link to SecDir review:
https://www.ietf.org/mail-archive/web/secdir/current/msg04976.html
2015-01-19
06 Kathleen Moriarty [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss
2014-08-25
06 Gunter Van de Velde Request for Telechat review by OPSDIR Completed: Has Issues. Reviewer: Tom Taylor.
2014-08-21
06 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Sam Weiler.
2014-08-21
06 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2014-08-21
06 Kathleen Moriarty
[Ballot discuss]
Sorry for the late discuss, the SecDir review came in late and Sam has a few questions that really should get addressed as …
[Ballot discuss]
Sorry for the late discuss, the SecDir review came in late and Sam has a few questions that really should get addressed as it has the potential to change the draft.  It would be helpful to understand a few of the decisions and see if some of his suggestions assist with the options that the WG goes forward with.  It may or may not apply, but would be helpful to discuss and understand that.

Here is a link to the review:
https://www.ietf.org/mail-archive/web/secdir/current/msg04976.html
2014-08-21
06 Kathleen Moriarty [Ballot Position Update] Position for Kathleen Moriarty has been changed to Discuss from No Objection
2014-08-21
06 Ted Lemon
[Ballot comment]
In 3:
  However,
  in the Meticulous Keyed MD5 and the Meticulous Keyed SHA-1
  mechanisms, the sequence member is required to …
[Ballot comment]
In 3:
  However,
  in the Meticulous Keyed MD5 and the Meticulous Keyed SHA-1
  mechanisms, the sequence member is required to monotonically increase
  with each successive packet.

"monotonically increasing" means the same thing as "non-decreasing."  That is, a for monotonically increasing function f, it is always true that f(x) <= f(x+k) for all positive values of k.  I think you mean "strictly increasing."  But really you could just say "is required to increase with each successive packet."

Thanks for doing this analysis!
2014-08-21
06 Ted Lemon [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon
2014-08-21
06 Alia Atlas
[Ballot comment]
This document could be strongly - both in describing the scaling issues for how BFD is run and the locality.  For instance, the …
[Ballot comment]
This document could be strongly - both in describing the scaling issues for how BFD is run and the locality.  For instance, the difference between BFD sessions for a one-hop session where the TTL can be trivially checked and the BFD sessions run at ms granularity vs. multi-hop sessions where they can be much slower.

The document would really benefit from a section discussing deployment use-cases and discussing the attacks and appropriate mitigation in each of those scenarios.

As written, I don't feel that the draft conveys much useful or actionable information and is more likely to be interpreted as not quite understanding realistic deployments - which is a pity.

I am tempted to make this a discuss...
2014-08-21
06 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-08-20
06 Stephen Farrell
[Ballot comment]

This is not a DISCUSS as I think more analysis is needed on
the threats faced by BFD than is presented here (apologies …
[Ballot comment]

This is not a DISCUSS as I think more analysis is needed on
the threats faced by BFD than is presented here (apologies if
that's elsewhere and I'm ignorant) and a later solutions
draft that doesn't do that can always attract a DISCUSS.
Anyway, the point is that simply complaining that the current
auth schemes don't work doesn't tell you what to fix.  (Note:
I am not saying that GMAC is the wrong answer, I'm saying
that there's not enough presented here to know so a solution
draft that says "look there - GMAC has to be right" could
well attract such a DISCUSS.)

As a separate general point, I have to say that this document
doesn't explain to the reader why there's a real problem with
crypto for BFD. And doing a HMAC in microseconds is not a
problem - opennssl tells me that it takes about 8
microseconds for a hmac-md5 over 1024 bytes on my laptop in
pure s/w - 10 milliseconds for 3 instances of HMAC is ages. I
think you're neglecting here to say that there are 1000's of
parallel sessions or something, but in any case, as presented,
the timing constraints do not seem to be at all hard which
makes the document less convincing that I believe ought be
the case. (Note - I do believe from chatting with folks that
there is some real problem with BFD security, but this
document does not capture that well as far as I can see.)

section 2: MD5 and SHA-1 are used with HMAC, right?  With
HMAC, collision resistance for the hash function is not the
required property, but rather pre-image resistance and we
don't know that SHA-1 is weak in that respect, and even
HMAC-MD5 is still ok. There are still be good reasons to want
new algorithms, but I don't think that lack of collision
reisistance for hash function used in HMAC is one of them.

section 3 says: "Echo packets are not defined in the BFD
specification, though they can keep the BFD session up.  The
format of the echo packet is local to the sending side and
there are no guidelines on the properties of these packets
beyond the choice of the source and destination addresses."
That seems really weird. The "add security but we're not
saying how" that follows is even weirder.
2014-08-20
06 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2014-08-20
06 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2014-08-20
06 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2014-08-20
06 Joel Jaeggli
[Ballot comment]
It would be helpful to distinguish between cases where a replay attack requires that you be on-link (e.g. some link-layer encapsulation) versus the …
[Ballot comment]
It would be helpful to distinguish between cases where a replay attack requires that you be on-link (e.g. some link-layer encapsulation) versus the cases such as ipv4/ipv6 maybe mpls that could potentially be injected /spoofed from offlink.
2014-08-20
06 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2014-08-20
06 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2014-08-20
06 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-08-18
06 Spencer Dawkins
[Ballot comment]
Is this text:

  There are several requirements described in section 3 of The Threat
  Analysis and Requirements for Cryptographic Authentication of …
[Ballot comment]
Is this text:

  There are several requirements described in section 3 of The Threat
  Analysis and Requirements for Cryptographic Authentication of Routing
  Protocols' Transports [RFC6862] that BFD does not currently meet:

still going to be true when it appears in an RFC? Perhaps “that BFD as defined in [RFC5880] does not meet”? or whatever the right reference would be …
2014-08-18
06 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2014-08-18
06 Scott Brim Request for Telechat review by GENART Completed: Ready. Reviewer: Scott Brim.
2014-08-18
06 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Tom Taylor
2014-08-18
06 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Tom Taylor
2014-08-15
06 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-08-14
06 Jean Mahoney Request for Telechat review by GENART is assigned to Scott Brim
2014-08-14
06 Jean Mahoney Request for Telechat review by GENART is assigned to Scott Brim
2014-08-14
06 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2014-08-14
06 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2014-08-14
06 Adrian Farrel IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2014-08-14
06 Adrian Farrel Ballot has been issued
2014-08-14
06 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel
2014-08-14
06 Adrian Farrel Created "Approve" ballot
2014-08-14
06 Adrian Farrel Placed on agenda for telechat - 2014-08-21
2014-08-14
06 Adrian Farrel Changed consensus to Yes from Unknown
2014-08-13
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-08-13
06 Mahesh Jethanandani New version available: draft-ietf-karp-bfd-analysis-06.txt
2014-08-13
05 Adrian Farrel
Hello authors and shepherd,

IETF last call has completed.
Thanks for the update to address the Routing Directorate review from Les.

I think you also …
Hello authors and shepherd,

IETF last call has completed.
Thanks for the update to address the Routing Directorate review from Les.

I think you also received some comments from Tom Taylor. They look minor, but you should still pick them up.

Cheers,
Adrian
2014-08-13
05 Adrian Farrel IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2014-08-12
05 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2014-08-08
05 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Tom Taylor.
2014-08-01
05 Manav Bhatia IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2014-08-01
05 Manav Bhatia New version available: draft-ietf-karp-bfd-analysis-05.txt
2014-07-30
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tom Taylor
2014-07-30
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tom Taylor
2014-07-27
04 Scott Brim Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Scott Brim.
2014-07-17
04 Jean Mahoney Request for Last Call review by GENART is assigned to Scott Brim
2014-07-17
04 Jean Mahoney Request for Last Call review by GENART is assigned to Scott Brim
2014-07-17
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sam Weiler
2014-07-17
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sam Weiler
2014-07-17
04 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2014-07-17
04 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-karp-bfd-analysis-04, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-karp-bfd-analysis-04, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object.

If this assessment is not accurate, please respond as soon as possible.
2014-07-15
04 Amy Vezza IANA Review state changed to IANA - Review Needed
2014-07-15
04 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Analysis of Bidirectional Forwarding Detection (BFD) …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Analysis of Bidirectional Forwarding Detection (BFD) Security According to KARP Design Guide) to Informational RFC

The IESG has received a request from an individual submitter to consider
the following document:
- 'Analysis of Bidirectional Forwarding Detection (BFD) Security
  According to KARP Design Guide'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-08-12. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

  This document analyzes the Bidirectional Forwarding Detection
  protocol (BFD) according to the guidelines set forth in section 4.2
  of KARP Design Guidelines [RFC6518].

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-karp-bfd-analysis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-karp-bfd-analysis/ballot/

No IPR declarations have been submitted directly on this I-D.
2014-07-15
04 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2014-07-15
04 Adrian Farrel Last call was requested
2014-07-15
04 Adrian Farrel Ballot approval text was generated
2014-07-15
04 Adrian Farrel IESG state changed to Last Call Requested from AD Evaluation
2014-07-15
04 Adrian Farrel Last call announcement was changed
2014-07-15
04 Adrian Farrel Last call announcement was generated
2014-07-15
04 Adrian Farrel Last call announcement was generated
2014-07-15
04 Adrian Farrel Ballot writeup was changed
2014-07-15
04 Adrian Farrel Ballot writeup was generated
2014-07-15
04 Adrian Farrel IESG state changed to AD Evaluation from Publication Requested
2014-07-02
04 Adrian Farrel Assigned to Routing Area
2014-07-02
04 Adrian Farrel Note added 'Processing as AD Sponsored as KARP working group has closed down.'
2014-07-02
04 Adrian Farrel Intended Status changed to Informational
2014-07-02
04 Adrian Farrel IESG process started in state Publication Requested
2014-07-02
04 (System) Earlier history may be found in the Comment Log for /doc/draft-bhatia-zhang-karp-bfd-analysis/
2014-07-01
04 Brian Weis Changed document writeup
2014-07-01
04 Brian Weis Changed document writeup
2014-06-26
04 Dacheng Zhang New version available: draft-ietf-karp-bfd-analysis-04.txt
2014-06-19
03 Mahesh Jethanandani New version available: draft-ietf-karp-bfd-analysis-03.txt
2014-05-30
02 Cindy Morgan Changed field(s): group,abstract
2014-05-29
02 Brian Weis Document shepherd changed to Brian Weis
2014-05-22
02 Mahesh Jethanandani New version available: draft-ietf-karp-bfd-analysis-02.txt
2013-09-10
01 Dacheng Zhang New version available: draft-ietf-karp-bfd-analysis-01.txt
2013-03-11
00 Dacheng Zhang New version available: draft-ietf-karp-bfd-analysis-00.txt