[178119] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Interesting BFD discussion on reddit

daemon@ATHENA.MIT.EDU (Rob Seastrom)
Mon Feb 16 21:50:06 2015

X-Original-To: nanog@nanog.org
To: Dave Waters <davewaters1970@gmail.com>
From: Rob Seastrom <rs@seastrom.com>
Date: Mon, 16 Feb 2015 21:50:02 -0500
In-Reply-To: <CAARSoVzCwMb1HyDPWfS+_3_Qv8oBU1tZ5Jtqf5RfY0vTsDKmpA@mail.gmail.com> (Dave
 Waters's message of "Tue, 17 Feb 2015 07:42:20 +0530")
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


Many moons ago, Mike O'Dell had a pithy observation about "can"
vs. "should" that is escaping me at this moment, which is a pity since
it almost certainly applies here.

-r

Dave Waters <davewaters1970@gmail.com> writes:

> Because BFD packets can get routed across multiple hops. Unlike EBGP where you connect to a
> peer in a different AS and you have a direct connection, BFD packets can traverse multiple
> hops to reach the endpoint.
>
>
>
> In case of multihop BFD the BFD packets also get re-routed when the topology changes so you
> can almost never bet on the TTL value to secure the protocol.
>
>
>
> Dave
>
>
>
> On Tue, Feb 17, 2015 at 7:03 AM, Rob Seastrom <[[rs@seastrom.com]]> wrote:
>
>                          Dave Waters <[[davewaters1970@gmail.com]]> writes:
>      
>      >
>      [[http://www.reddit.com/r/networking/comments/2vxj9u/very_elegant_and_a_simple_way_to_secure_bfd/]]
>      >
>      > Authentication mechanisms defined for IGPs cannot be used to protect BFD
>      > since the rate at which packets are processed in BFD is very high.
>      >
>      > Dave
>      
>      
>
>
>      One might profitably ask why BFD wasn't designed to take advantage of
>      high-TTL-shadowing, a la draft-gill-btsh.
>      
>      -r
>      
>      
>      

home help back first fref pref prev next nref lref last post