[Last-Call] draft-ietf-bfd-secure-sequence-numbers-22 ietf last call Genart review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Document: draft-ietf-bfd-secure-sequence-numbers
Title: Meticulous Keyed ISAAC for BFD Optimized Authentication
Reviewer: Mallory Knodel
Review result: Not Ready

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://wiki.ietf.org/en/group/gen/GenArtFAQ>.

Document: draft-ietf-bfd-secure-sequence-numbers-??
Reviewer: Mallory Knodel
Review Date: 2025-08-13
IETF LC End Date: 2025-08-18
IESG Telechat date: Not scheduled for a telechat

Summary: This document specifies the provision of a Meticulous Keyed mode for
Bidirectional Forwarding Detection (bfd) authentication.

Major issues: Thanks very much for this draft. As others have pointed out, this
document is clearly establishing a new terminology and a foundational
specification as described in the bfd charter, however there persists
inconsistency in how this is described. Separately I have found (capitalization
preserved, indicating confusion about what is/isn't a proper noun):

 * "Meticulous Keyed ISAAC for BFD Optimized Authentication" (title)

 * "Meticulous Keyed ISAAC authentication"

 * "Meticulous Keyed ISAAC Authentication"

 * "Meticulous Keyed ISAAC for BFD Authentication"

 * "BFD Optimized Authentication using Meticulous Keyed MD5"

 * "Optimized MD5 Meticulous Keyed ISAAC Authentication"

 * "...Meticulous Keyed ISAAC Keyed..." (from
 draft-ietf-bfd-optimizing-authentication)

It seems that the nomenclature should be somewhat patterned in format
everywhere consistently thusly:

 * "Meticulous Keyed mode for BFD authentication"

 * eg, "Meticulous Keyed [ISAAC/SHA-1/etc] for BFD authentication"

The rest of the variations seem to be an attempt to coin a proper noun, which
may not be entirely necessary and because so many descriptors are involved, eg
"BFD," "Optimised", that perhaps it would be challenging to ever remember their
proper order. Thus one could instead just rely on "Meticulously Keyed" as the
proper noun and treat the rest as adjectives or descriptors in context.

I do agree with other reviewers' suggestions that without a clear definition
that unfamiliar readers might be struggle to understand the core specification.
I found reading the bfd charter and milestone drafts helpful and perhaps you
could write a brief description in the introduction, perhaps as a second
paragraph, about this document as it relates to the BFD's larger slate of work.
Section 3 helpfully does some of this work.

I appreciate Section 1.1. but I think it can be presented as an update to
RFC5880 unself-consciously, for instance:

In RFC5880 [RFC5880], "(sequence number excerpt)." Here the terms "meticulous
keyed" and "meticulous keying" ... (final paragraph) means that the Sequence
number is incremented on every new packet that is sent.  The term "keyed" means
that ... "Meticulous Keyed" therefore refers to BFD authentication type where
each packet is unique, and can be authenticated.

Just pointing out that if meticulous means unique and keyed means authenticated
then 'meticulous keyed bfd authentication' means unique authenticated bfd
authentication. This coarse simplification might illustrate how to streamline
the terminology, to the extent that you can use this document and the
optimizing-authentication draft to gently revise terms and definitions
inherited from prior documents.

Minor issues:

 * What is the reason that this draft is experimental? Is there something more
 stable that is or should be used instead that this replaces? If so, please
 clearly state that.

 * S 3.1. "originator of the packet is authentic" or "originator of the packet
 is authenticated"?

 * Document outline could be streamlined. Sections 4.1. and 6. have the same
 title but present different information. Perhaps Sections 4-6 could be better
 organized, or the current structure justified with more descriptive titles.

 * In security considerations I think the final sentence could be more explicit
 about the tradeoff between generator security and resource constraints and
 that picking something stronger like AES is infeasible in routing protocols.

Nits/editorial comments:

 * S 3.1. "If / when" can just be "if" logically.

 * "page" and "next page" (rather than "next" page) need only be in quotes on
 the first use to indicate they are terms of art.

 * It's enough that "Your Discriminator" is in uppercase, so I think the use of
 quotes is never needed. It doesn't seem this convention is followed for other
 field names, or at least the document should harmonize how it indicates field
 names. Sometimes it seems that field entries are put within quotations, rather
 than field names.

 * Section 15.1. penultimate paragraph "dictionary attaches" should be
 "dictionary attacks".

Again, appreciate all your work on this document. I hope these comments and
suggestions can be helpful.

-Mallory


-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux