As a potentially closing note, unaffiliated BFD PDUs require GTSM procedures validating the TTL. In order for such an attacker to interpose themselves in such a fashion, it would have to be an attacker that appears one IP hop away, typically an on-link attacker. In such a case, the attack is the expected destination being taken down but the BFD session being kept up. Unaffiliated BFD can't detect such imposters. BFD using one of the stronger authentications such as SHA-1 will have better resiliency against talking to such imposters. In scenarios where this is a concern, unaffiliated BFD should not be used. Even when stronger BFD authentication is in use, it shouldn't be used as a mechanism to try to provide application level authentication of the endpoints. -- Jeff |
-- last-call mailing list -- last-call@xxxxxxxx To unsubscribe send an email to last-call-leave@xxxxxxxx