* Abstract It fails to tell a reader what this document provides and leaves the paper with a pointer to section 6.7 of RFC 5880. * Introduction The first paragraph leaves me puzzled as it is not clear what the concerns are. Is it that cryptographic hash algorithms are generally too expensive? Is this still true of you have hardware support? Or is this work driven by specific concerns about the security of specific cryptographic hash algorithms? Anyway, cryptoagility implies that hash algorithms should be replaceable. The second paragraph describes what the experiment is but it still does not say what the optimization is all about. And then I read about procedural classification of this document. It is only afterwards that the text starts to educate the reader what this is all about. But again, this is by first introducing details first before coming to the point that the idea is to authenticate only some of the BFD packets and not all of them. This should have been in the abstract and right at the beginning of the introduction. I found it funny that MD5 and SHA1 are considered "strong" a few sentences after it was said that there are substantial concerns about the strength of MD5 and SHA1. Interestingly, RFC 5880 actually says: "The use of MD5-based authentication is strongly discouraged." That is clear language. ;-) What does "significantly reduces the computational demand for the system while maintaining security of the session across the configured strong reauthentication interval" mean? If you go from authenticating each packet to authenticating say every N packets, then the performance gain does come with a reduced level of security since there are packets that are not authenticated. Perhaps it is OK to make this trade-off but it feels like the authors prefer to not be explicit about this trade-off. * Authentication Mode I wonder whether "optimized" is the right term. Is less security more optimal? Perhaps it is "reduced" authentication or "more lightweight" authentication? Well, perhaps in the industry, "optimized" authentication is just a synonym for reduced authentication? * Signaling Optimized Authentication Existing implementations will ignore the optimized authentication mode, I assume authors have verified that some systems ignoring the mode will not cause operational problems. * Optimizing Authentication YANG Model What is the reason for a default of 60 seconds for the reauth interval? According to the security considerations, there is a security vs. performance trade-off here. Any particular reason why 60 seconds is a good setting? * Security Considerations I am puzzled by this statement: "The approach described in this document enhances the ability to authenticate a BFD session by taking away the onerous requirement that every BFD control packet be authenticated." How does strongly authenticating only some packets enhance the ability to authenticate a BFD session? I also wonder how you close the section with "further enhances the security of BFD sessions". My naive understanding is that non-optimized BFD authentication is stronger than optimized secure BFD authentication even with sequence number authentication. Or said differently, if security is your prime operational concern, do not use "optimized" BFD authentication. From an operational perspective, I prefer documents that are clear about what they propose. If the goal is to improve performance by lowering the security level of sequences of BFD packets, just say so. (And I apologize in case I misunderstood document.)