1 / 7

Re-chartering BFD – IETF 78

Re-chartering BFD – IETF 78. Jeffrey Haas, jhaas@pfrc.org Dave Ward, dward@juniper.net. Where do we go from here. We have largely accomplished our original charter. Our original charter prohibited taking on new working group items without re-chartering.

rowdy
Télécharger la présentation

Re-chartering BFD – IETF 78

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Re-chartering BFD – IETF 78 Jeffrey Haas, jhaas@pfrc.org Dave Ward, dward@juniper.net

  2. Where do we go from here • We have largely accomplished our original charter. • Our original charter prohibited taking on new working group items without re-chartering. • What kind of work do we want to take on?

  3. The Chairs’ Opinion • Provide review and advice for applications of BFD in other working groups. • See, for example, the IDR charter for BGP and its relationship with other working groups. • Provide extensions to BFD that cover core use cases requiring changes to the base BFD protocol.

  4. Suggested Criteria for Extensions • BFD stands for bi-directional forwarding detection. If a proposed extension or change to a specification doesn’t deal with detecting issues with forwarding, it’s not appropriate for BFD. • BFD is often run in line cards and at wire speed. This means that it should be kept simple.

  5. Proposed work item • Point to Multi-point BFD. • We have single-hop and multi-hop applications for BFD. • Point to Multi-point applications have become part of critical infrastructure to many customers.

  6. Proposed work item • Generic Cryptographic Authentication • The existing authentication mechanism in the core BFD protocol only handles a single key. This provides no ability to do key rotation. • The same draft also recommends HMAC versions of the security ciphers. • Both of the above are consistent with currently recommended protocol security practices.

  7. Other work items • Please submit possible working group items to the mailing list. • After discussion of new work items, or two weeks after IETF 78 is complete if no new items are submitted, we will send a proposed charter to the mailing list for comment. After achieving consensus, we will submit the charter for approval. • Time after the presentations is reserved for open discussion.

More Related