rfc7126.original | rfc7126.txt | |||
---|---|---|---|---|
Operational Security Capabilities for F. Gont | Internet Engineering Task Force (IETF) F. Gont | |||
IP Network Infrastructure (opsec) UTN-FRH / SI6 Networks | Request for Comments: 7126 UTN-FRH / SI6 Networks | |||
Internet-Draft R. Atkinson | BCP: 186 R. Atkinson | |||
Intended status: BCP Consultant | Category: Best Current Practice Consultant | |||
Expires: June 12, 2014 C. Pignataro | ISSN: 2070-1721 C. Pignataro | |||
Cisco | Cisco | |||
December 9, 2013 | January 2014 | |||
Recommendations on filtering of IPv4 packets containing IPv4 options. | Recommendations on Filtering of IPv4 Packets Containing IPv4 Options | |||
draft-ietf-opsec-ip-options-filtering-07 | ||||
Abstract | Abstract | |||
This document provides advice on the filtering of IPv4 packets based | This document provides advice on the filtering of IPv4 packets based | |||
on the IPv4 options they contain. Additionally, it discusses the | on the IPv4 options they contain. Additionally, it discusses the | |||
operational and interoperability implications of dropping packets | operational and interoperability implications of dropping packets | |||
based on the IP options they contain. | based on the IP options they contain. | |||
Status of this Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | ||||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | This memo documents an Internet Best Current Practice. | |||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at http://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It has been approved for publication by the Internet | |||
time. It is inappropriate to use Internet-Drafts as reference | Engineering Steering Group (IESG). Further information on BCPs is | |||
material or to cite them other than as "work in progress." | available in Section 2 of RFC 5741. | |||
This Internet-Draft will expire on June 12, 2014. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
http://www.rfc-editor.org/info/rfc7126. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
1.1. Terminology and Conventions Used in This Document . . . . 3 | 1.1. Terminology and Conventions Used in This Document . . . . 3 | |||
1.2. Operational Focus . . . . . . . . . . . . . . . . . . . . 4 | 1.2. Operational Focus . . . . . . . . . . . . . . . . . . . . 4 | |||
2. IP Options . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. IP Options . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
3. General Security Implications of IP options . . . . . . . . . 5 | 3. General Security Implications of IP Options . . . . . . . . . 5 | |||
3.1. Processing Requirements . . . . . . . . . . . . . . . . . 5 | 3.1. Processing Requirements . . . . . . . . . . . . . . . . . 5 | |||
4. Advice on the Handling of Packets with Specific IP Options . . 7 | 4. Advice on the Handling of Packets with Specific IP Options . 6 | |||
4.1. End of Option List (Type = 0) . . . . . . . . . . . . . . 7 | 4.1. End of Option List (Type = 0) . . . . . . . . . . . . . . 7 | |||
4.2. No Operation (Type = 1) . . . . . . . . . . . . . . . . . 7 | 4.2. No Operation (Type = 1) . . . . . . . . . . . . . . . . . 7 | |||
4.3. Loose Source and Record Route (LSRR) (Type = 131) . . . . 8 | 4.3. Loose Source and Record Route (LSRR) (Type = 131) . . . . 8 | |||
4.4. Strict Source and Record Route (SSRR) (Type = 137) . . . . 10 | 4.4. Strict Source and Record Route (SSRR) (Type = 137) . . . 10 | |||
4.5. Record Route (Type = 7) . . . . . . . . . . . . . . . . . 11 | 4.5. Record Route (Type = 7) . . . . . . . . . . . . . . . . . 11 | |||
4.6. Stream Identifier (Type = 136) (obsolete) . . . . . . . . 12 | 4.6. Stream Identifier (Type = 136) (obsolete) . . . . . . . . 12 | |||
4.7. Internet Timestamp (Type = 68) . . . . . . . . . . . . . . 13 | 4.7. Internet Timestamp (Type = 68) . . . . . . . . . . . . . 13 | |||
4.8. Router Alert (Type = 148) . . . . . . . . . . . . . . . . 14 | 4.8. Router Alert (Type = 148) . . . . . . . . . . . . . . . . 14 | |||
4.9. Probe MTU (Type = 11) (obsolete) . . . . . . . . . . . . . 15 | 4.9. Probe MTU (Type = 11) (obsolete) . . . . . . . . . . . . 15 | |||
4.10. Reply MTU (Type = 12) (obsolete) . . . . . . . . . . . . . 16 | 4.10. Reply MTU (Type = 12) (obsolete) . . . . . . . . . . . . 16 | |||
4.11. Traceroute (Type = 82) . . . . . . . . . . . . . . . . . . 16 | 4.11. Traceroute (Type = 82) . . . . . . . . . . . . . . . . . 16 | |||
4.12. DoD Basic Security Option (Type = 130) . . . . . . . . . . 17 | 4.12. DoD Basic Security Option (Type = 130) . . . . . . . . . 17 | |||
4.13. DoD Extended Security Option (Type = 133) . . . . . . . . 20 | 4.13. DoD Extended Security Option (Type = 133) . . . . . . . . 20 | |||
4.14. Commercial IP Security Option (CIPSO) (Type = 134) . . . . 22 | 4.14. Commercial IP Security Option (CIPSO) (Type = 134) . . . 22 | |||
4.15. VISA (Type = 142) . . . . . . . . . . . . . . . . . . . . 23 | 4.15. VISA (Type = 142) . . . . . . . . . . . . . . . . . . . . 23 | |||
4.16. Extended Internet Protocol (Type = 145) . . . . . . . . . 23 | 4.16. Extended Internet Protocol (Type = 145) . . . . . . . . . 23 | |||
4.17. Address Extension (Type = 147) . . . . . . . . . . . . . . 24 | 4.17. Address Extension (Type = 147) . . . . . . . . . . . . . 24 | |||
4.18. Sender Directed Multi-Destination Delivery (Type = 149) . 25 | 4.18. Sender Directed Multi-Destination Delivery (Type = 149) . 25 | |||
4.19. Dynamic Packet State (Type = 151) . . . . . . . . . . . . 25 | 4.19. Dynamic Packet State (Type = 151) . . . . . . . . . . . . 25 | |||
4.20. Upstream Multicast Pkt. (Type = 152) . . . . . . . . . . . 26 | 4.20. Upstream Multicast Pkt. (Type = 152) . . . . . . . . . . 26 | |||
4.21. Quick-Start (Type = 25) . . . . . . . . . . . . . . . . . 27 | 4.21. Quick-Start (Type = 25) . . . . . . . . . . . . . . . . . 27 | |||
4.22. RFC3692-style Experiment (Types = 30, 94, 158, and 222) . 28 | 4.22. RFC3692-Style Experiment (Types = 30, 94, 158, and 222) . 28 | |||
4.23. Other IP Options . . . . . . . . . . . . . . . . . . . . . 28 | 4.23. Other IP Options . . . . . . . . . . . . . . . . . . . . 28 | |||
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 30 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 30 | |||
6. Security Considerations . . . . . . . . . . . . . . . . . . . 30 | 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 30 | |||
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 30 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 31 | |||
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 31 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 31 | |||
8.1. Normative References . . . . . . . . . . . . . . . . . . . 31 | 7.2. Informative References . . . . . . . . . . . . . . . . . 31 | |||
8.2. Informative References . . . . . . . . . . . . . . . . . . 31 | ||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 35 | ||||
1. Introduction | 1. Introduction | |||
This document discusses the filtering of IPv4 packets based on the | This document discusses the filtering of IPv4 packets based on the | |||
IPv4 options they contain. Since various protocols may use IPv4 | IPv4 options they contain. Since various protocols may use IPv4 | |||
options to some extent, dropping packets based on the options they | options to some extent, dropping packets based on the options they | |||
contain may have implications on the proper functioning of the | contain may have implications on the proper functioning of such | |||
protocol. Therefore, this document attempts to discuss the | protocols. Therefore, this document attempts to discuss the | |||
operational and interoperability implications of such dropping. | operational and interoperability implications of such dropping. | |||
Additionally, it outlines what a network operator might do in a | Additionally, it outlines what a network operator might do in typical | |||
typical enterprise or Service Provider environments. This document | enterprise or Service Provider environments. This document also | |||
also draws and is partly derifed from [RFC6274], which also received | draws and is partly derived from [RFC6274], which also received | |||
review from the operational community. | review from the operational community. | |||
We note that data seems to indicate that there is a current | We note that data seems to indicate that there is a current | |||
widespread practice of blocking IPv4 optioned packets. There are | widespread practice of blocking IPv4 optioned packets. There are | |||
various plausible approaches to minimize the potential negative | various plausible approaches to minimize the potential negative | |||
effects of IPv4 optioned packets while allowing some options | effects of IPv4 optioned packets while allowing some option | |||
semantics. One approach is to allow for specific options that are | semantics. One approach is to allow for specific options that are | |||
expected or needed, and a default deny. A different approach is to | expected or needed, and have a default deny. A different approach is | |||
deny unneeded options and a default allow. Yet a third possible | to deny unneeded options and have a default allow. Yet a third | |||
approach is to allow for end-to-end semantics by ignoring options and | possible approach is to allow for end-to-end semantics by ignoring | |||
treating packets as un-optioned while in transit. Experiments and | options and treating packets as un-optioned while in transit. | |||
currently-available data tends to support the first or third | Experiments and currently available data tend to support the first or | |||
approaches as more realistic. Some results of regarding the current | third approaches as more realistic. Some results regarding the | |||
state of affairs with respect to dropping packets containing IP | current state of affairs with respect to dropping packets containing | |||
options can be found in [MEDINA] [FONSECA]. Additionally, | IP options can be found in [MEDINA] and [FONSECA]. Additionally, | |||
[BREMIER-BARR] points out that the deployed Internet already has many | [BREMIER-BARR] points out that the deployed Internet already has many | |||
routers that do not process IP options. | routers that do not process IP options. | |||
We also note that while this document provides advice on dropping | We also note that while this document provides advice on dropping | |||
packets on a "per IP option type", not all devices (routers, security | packets on a "per IP option type", not all devices (routers, security | |||
gateways, and firewalls) may provide this capability with such | gateways, and firewalls) may provide this capability with such | |||
granularity. Additionally, even in cases in which such functionality | granularity. Additionally, even in cases in which such functionality | |||
is provided, the operator might want to specify a dropping policy | is provided, an operator might want to specify a dropping policy with | |||
with a coarser granularity (rather than on a "per IP option type" | a coarser granularity (rather than on a "per IP option type" | |||
granularity), as indicated above. | granularity), as indicated above. | |||
Finally, in scenarios in which processing of IP options by | Finally, in scenarios in which processing of IP options by | |||
intermediate systems is not required, a widespread approach is to | intermediate systems is not required, a widespread approach is to | |||
simply ignore IP options, and process the corresponding packets as if | simply ignore IP options and process the corresponding packets as if | |||
they do not contain any IP options. | they do not contain any IP options. | |||
1.1. Terminology and Conventions Used in This Document | 1.1. Terminology and Conventions Used in This Document | |||
The terms "fast path", "slow path", and associated relative terms | The terms "fast path", "slow path", and associated relative terms | |||
("faster path" and "slower path") are loosely defined as in Section 2 | ("faster path" and "slower path") are loosely defined as in Section 2 | |||
of [RFC6398]. | of [RFC6398]. | |||
Because of the security-oriented nature of this document, we are | Because of the security-oriented nature of this document, we are | |||
deliberately including some historical citations. This is | deliberately including some historical citations. The goal is to | |||
intentional, and has the goal of explicitly retaining and showing | explicitly retain and show history, as well as remove ambiguity and | |||
history, as well as removing ambiguity and confusion. | confusion. | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
1.2. Operational Focus | 1.2. Operational Focus | |||
All of the recommendations in this document have been made in an | All of the recommendations in this document have been made in an | |||
effort to optimise for operational community consensus, as best the | effort to optimize for operational community consensus, as best the | |||
editors have been able to determine that. This has included not only | authors have been able to determine that. This has included not only | |||
accepting feedback from public lists, but also accepting off-list | accepting feedback from public lists, but also accepting off-list | |||
feedback from people at various network operators (e.g. ISPs, | feedback from people at various network operators (e.g. Internet | |||
content providers, educational institutions, commercial firms). | Service Providers, content providers, educational institutions, | |||
commercial firms). | ||||
2. IP Options | 2. IP Options | |||
IP options allow for the extension of the Internet Protocol. As | IP options allow for the extension of the Internet Protocol. As | |||
specified in [RFC0791], there are two cases for the format of an | specified in [RFC0791], there are two cases for the format of an | |||
option: | option: | |||
o Case 1: A single byte of option-type. | o Case 1: A single byte of option-type. | |||
o Case 2: An option-type byte, an option-length byte, and the actual | o Case 2: An option-type byte, an option-length byte, and the actual | |||
skipping to change at page 5, line 5 | skipping to change at page 4, line 44 | |||
IP options of Case 2 have the following syntax: | IP options of Case 2 have the following syntax: | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | |||
| option-type | option-length | option-data | | option-type | option-length | option-data | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | |||
In this case, the option-length byte counts the option-type byte and | In this case, the option-length byte counts the option-type byte and | |||
the option-length byte, as well as the actual option-data bytes. | the option-length byte, as well as the actual option-data bytes. | |||
All current and future options except "End of Option List" (Type = 0) | All current and future options, except "End of Option List" (Type = | |||
and "No Operation" (Type = 1), are of Class 2. | 0) and "No Operation" (Type = 1), are of Class 2. | |||
The option-type has three fields: | The option-type has three fields: | |||
o 1 bit: copied flag. | o 1 bit: copied flag. | |||
o 2 bits: option class. | o 2 bits: option class. | |||
o 5 bits: option number. | o 5 bits: option number. | |||
The copied flag indicates whether this option should be copied to all | The copied flag indicates whether this option should be copied to all | |||
skipping to change at page 5, line 42 | skipping to change at page 5, line 33 | |||
This format allows for the creation of new options for the extension | This format allows for the creation of new options for the extension | |||
of the Internet Protocol (IP). | of the Internet Protocol (IP). | |||
Finally, the option number identifies the syntax of the rest of the | Finally, the option number identifies the syntax of the rest of the | |||
option. | option. | |||
The "IP OPTION NUMBERS" registry [IANA-IP] contains the list of the | The "IP OPTION NUMBERS" registry [IANA-IP] contains the list of the | |||
currently assigned IP option numbers. | currently assigned IP option numbers. | |||
3. General Security Implications of IP options | 3. General Security Implications of IP Options | |||
3.1. Processing Requirements | 3.1. Processing Requirements | |||
Historically, most IP routers used a general-purpose CPU to process | Historically, most IP routers used a general-purpose CPU to process | |||
IP packets and forward them towards their destination. This same CPU | IP packets and forward them towards their destinations. This same | |||
usually also processed network management traffic (e.g., SNMP), | CPU usually also processed network management traffic (e.g., SNMP), | |||
configuration commands (e.g., command line interface), and various | configuration commands (e.g., command line interface), and various | |||
routing protocols (e.g., RIP, OSPF, BGP, IS-IS) or other control | routing protocols (e.g., RIP, OSPF, BGP, IS-IS) or other control | |||
protocols (e.g., RSVP, ICMP). In such architectures it has been | protocols (e.g., RSVP, ICMP). In such architectures, it has been | |||
common for the general-purpose CPU also to perform any packet | common for the general-purpose CPU also to perform any packet | |||
filtering that has been enabled on the router (or router interface). | filtering that has been enabled on the router (or router interface). | |||
An IP router built using this architecture often has a significant | An IP router built using this architecture often has a significant | |||
(Distributed) Denial-of-Service (DDOS) attack risk if the router | Distributed Denial-of-Service (DDoS) attack risk if the router | |||
control plane (e.g., CPU) is overwhelmed by a large number of IPv4 | control plane (e.g., CPU) is overwhelmed by a large number of IPv4 | |||
packets that contain IPv4 options. | packets that contain IPv4 options. | |||
From about 1995 onwards, a growing number of IP routers have | From about 1995 onwards, a growing number of IP routers have | |||
incorporated specialized IP packet processing silicon (i.e., FPGA, | incorporated silicon specialized for IP packet processing (i.e., | |||
ASIC), thereby separating the IP packet forwarding function from the | Field-Programmable Gate Array (FPGA), Application-Specific Integrated | |||
other functions of the router. Such router architectures tend to be | Circuit (ASIC)), thereby separating the function of IP packet | |||
more resilient to DDOS attacks that might be seen in the global | forwarding from the other functions of the router. Such router | |||
public Internet. Depending upon various implementation and | architectures tend to be more resilient to DDoS attacks that might be | |||
configuration details, routers with a silicon packet forwarding | seen in the global public Internet. Depending upon various | |||
engine can handle high volumes of IP packets containing IP Options | implementation and configuration details, routers with a silicon | |||
without any adverse impact on packet forwarding rates or on the | packet-forwarding engine can handle high volumes of IP packets | |||
router's control plane (e.g., general-purpose CPU). Some | containing IP options without any adverse impact on packet-forwarding | |||
implementations have a configuration knob simply to forward all IP | rates or on the router's control plane (e.g., general-purpose CPU). | |||
packets containing IP Options at wire-speed in silicon as if the IP | Some implementations have a configuration knob simply to forward all | |||
packet did not contain an IP option ("ignore options & forward"). | IP packets containing IP options at wire-speed in silicon, as if the | |||
Other implementations support wire-speed silicon-based packet | IP packet did not contain any IP options ("ignore options & | |||
filtering, thereby enabling packets containing certain IP options to | forward"). Other implementations support wire-speed silicon-based | |||
be selectively dropped ("drop"), packets containing certain other IP | packet filtering, thereby enabling packets containing certain IP | |||
options to have those IP options ignored ("ignore options & | options to be selectively dropped ("drop"), packets containing | |||
forward"), and other packets containing different IP options to have | certain other IP options to have those IP options ignored ("ignore | |||
those options processed, either on a general-purpose CPU or using | options & forward"), and other packets containing different IP | |||
custom logic (e.g., FPGA, ASIC), while the packet is being forwarded | options to have those options processed, either on a general-purpose | |||
("process option & forward"). | CPU or using custom logic (e.g., FPGA, ASIC), while the packet is | |||
being forwarded ("process option & forward"). | ||||
Broadly speaking, any IP packet that requires processing by an IP | Broadly speaking, any IP packet that requires processing by an IP | |||
router's general-purpose CPU can be a DDOS risk to that router's | router's general-purpose CPU can be a DDoS risk to that router's | |||
general-purpose CPU (and thence to the router itself). However, at | general-purpose CPU (and thus to the router itself). However, at | |||
present, the particular architectural and engineering details of the | present, the particular architectural and engineering details of the | |||
particular IP router being considered are important to understand | specific IP router being considered are important to understand when | |||
when evaluating the operational security risks associated with a | evaluating the operational security risks associated with a | |||
particular IP packet type or IP option type. | particular IP packet type or IP option type. | |||
Operators are urged to consider IP option filtering and IP option | Operators are urged to consider the capabilities of potential IP | |||
handling capabilities of potential IP routers as they make deployment | routers for IP option filtering and handling as they make deployment | |||
decisions in future. | decisions in the future. | |||
Additional considerations for protecting the control plane from | Additional considerations for protecting the control plane from | |||
packets containing IP Options can be found in [RFC6192]. | packets containing IP options can be found in [RFC6192]. | |||
Finally, in addition to advice to operators, this document also | Finally, in addition to advice to operators, this document also | |||
provides advice to router, security gateway, and firewall | provides advice to router, security gateway, and firewall | |||
implementers in terms of providing the capability to filter packets | implementers in terms of providing the capability to filter packets | |||
with different granularities: both on a "per IP option type" | with different granularities: both on a "per IP option type" | |||
granularity (to maximize flexibility) as well as more coarse filters | granularity (to maximize flexibility) as well as more coarse filters | |||
(to minimize configuration complexity). | (to minimize configuration complexity). | |||
4. Advice on the Handling of Packets with Specific IP Options | 4. Advice on the Handling of Packets with Specific IP Options | |||
skipping to change at page 7, line 22 | skipping to change at page 7, line 13 | |||
dropped, and specific advice on whether to drop packets containing | dropped, and specific advice on whether to drop packets containing | |||
these options in a typical enterprise or Service Provider | these options in a typical enterprise or Service Provider | |||
environment. | environment. | |||
4.1. End of Option List (Type = 0) | 4.1. End of Option List (Type = 0) | |||
4.1.1. Uses | 4.1.1. Uses | |||
This option is used to indicate the "end of options" in those cases | This option is used to indicate the "end of options" in those cases | |||
in which the end of options would not coincide with the end of the | in which the end of options would not coincide with the end of the | |||
Internet Protocol Header. | Internet Protocol header. | |||
4.1.2. Option Specification | 4.1.2. Option Specification | |||
Specified in RFC 791 [RFC0791]. | Specified in RFC 791 [RFC0791]. | |||
4.1.3. Threats | 4.1.3. Threats | |||
No specific security issues are known for this IPv4 option. | No specific security issues are known for this IPv4 option. | |||
4.1.4. Operational and Interoperability Impact if Blocked | 4.1.4. Operational and Interoperability Impact if Blocked | |||
skipping to change at page 8, line 43 | skipping to change at page 8, line 35 | |||
4.3.1. Uses | 4.3.1. Uses | |||
This option lets the originating system specify a number of | This option lets the originating system specify a number of | |||
intermediate systems a packet must pass through to get to the | intermediate systems a packet must pass through to get to the | |||
destination host. Additionally, the route followed by the packet is | destination host. Additionally, the route followed by the packet is | |||
recorded in the option. The receiving host (end-system) must use the | recorded in the option. The receiving host (end-system) must use the | |||
reverse of the path contained in the received LSRR option. | reverse of the path contained in the received LSRR option. | |||
The LSSR option can be of help in debugging some network problems. | The LSSR option can be of help in debugging some network problems. | |||
Some ISP (Internet Service Provider) peering agreements require | Some Internet Service Provider (ISP) peering agreements require | |||
support for this option in the routers within the peer of the ISP. | support for this option in the routers within the peer of the ISP. | |||
4.3.2. Option Specification | 4.3.2. Option Specification | |||
Specified in RFC 791 [RFC0791]. | Specified in RFC 791 [RFC0791]. | |||
4.3.3. Threats | 4.3.3. Threats | |||
The LSRR option has well-known security implications [RFC6274]. | The LSRR option has well-known security implications [RFC6274]. | |||
Among other things, the option can be used to: | Among other things, the option can be used to: | |||
skipping to change at page 9, line 27 | skipping to change at page 9, line 16 | |||
o Perform bandwidth-exhaustion attacks. | o Perform bandwidth-exhaustion attacks. | |||
Of these attack vectors, the one that has probably received least | Of these attack vectors, the one that has probably received least | |||
attention is the use of the LSRR option to perform bandwidth | attention is the use of the LSRR option to perform bandwidth | |||
exhaustion attacks. The LSRR option can be used as an amplification | exhaustion attacks. The LSRR option can be used as an amplification | |||
method for performing bandwidth-exhaustion attacks, as an attacker | method for performing bandwidth-exhaustion attacks, as an attacker | |||
could make a packet bounce multiple times between a number of systems | could make a packet bounce multiple times between a number of systems | |||
by carefully crafting an LSRR option. | by carefully crafting an LSRR option. | |||
This is the IPv4-version of the IPv6 amplification attack that was | This is the IPv4 version of the IPv6 amplification attack that was | |||
widely publicized in 2007 [Biondi2007]. The only difference is | widely publicized in 2007 [Biondi2007]. The only difference is | |||
that the maximum length of the IPv4 header (and hence the LSRR | that the maximum length of the IPv4 header (and hence the LSRR | |||
option) limits the amplification factor when compared to the IPv6 | option) limits the amplification factor when compared to the IPv6 | |||
counter-part. | counterpart. | |||
Additionally, some implementations have been found to fail to include | Additionally, some implementations have been found to fail to include | |||
proper sanity checks on the LSRR option, thus leading to security | proper sanity checks on the LSRR option, thus leading to security | |||
issues. These specific issues are believed to be solved in all | issues. These specific issues are believed to be solved in all | |||
modern implementations. | modern implementations. | |||
[Microsoft1999] is a security advisory about a vulnerability | [Microsoft1999] is a security advisory about a vulnerability | |||
arising from improper validation of the Pointer field of the LSRR | arising from improper validation of the Pointer field of the LSRR | |||
option. | option. | |||
Finally, we note that some systems were known for providing a system- | Finally, we note that some systems were known for providing a system- | |||
wide toggle to enable support for this option for those scenarios in | wide toggle to enable support for this option for those scenarios in | |||
which this option is required. However, improper implementation of | which this option is required. However, improper implementation of | |||
such system-wide toggle caused those systems to support the LSRR | such a system-wide toggle caused those systems to support the LSRR | |||
option even when explicitly configured not to do so. | option even when explicitly configured not to do so. | |||
[OpenBSD1998] is a security advisory about an improper | [OpenBSD1998] is a security advisory about an improper | |||
implementation of such a system-wide toggle in 4.4BSD kernels. | implementation of such a system-wide toggle in 4.4BSD kernels. | |||
This issue was resolved in later versions of the corresponding | This issue was resolved in later versions of the corresponding | |||
operating system. | operating system. | |||
4.3.4. Operational and Interoperability Impact if Blocked | 4.3.4. Operational and Interoperability Impact if Blocked | |||
Network troubleshooting techniques that may employ the LSRR option | Network troubleshooting techniques that may employ the LSRR option | |||
(such as ping or traceroute with the appropriate arguments) would | (such as ping or traceroute with the appropriate arguments) would | |||
break when using the LSRR option (ping and traceroute without IPv4 | break when using the LSRR option. (Ping and traceroute without IPv4 | |||
options are not impacted). Nevertheless, it should be noted that it | options are not impacted.) Nevertheless, it should be noted that it | |||
is virtually impossible to use the LSRR option for troubleshooting, | is virtually impossible to use the LSRR option for troubleshooting, | |||
due to widespread dropping of packets that contain such option. | due to widespread dropping of packets that contain the option. | |||
4.3.5. Advice | 4.3.5. Advice | |||
Routers, security gateways, and firewalls SHOULD implement an option- | Routers, security gateways, and firewalls SHOULD implement an option- | |||
specific configuration knob whether packets with this option are | specific configuration knob to select whether packets with this | |||
dropped, packets with this IP option are forwarded as if they did not | option are dropped, packets with this IP option are forwarded as if | |||
contain this IP option, or packets with this option are processed and | they did not contain this IP option, or packets with this option are | |||
forwarded as per [RFC0791]. The default setting for this knob SHOULD | processed and forwarded as per [RFC0791]. The default setting for | |||
be "drop", and the default setting MUST be documented. | this knob SHOULD be "drop", and the default setting MUST be | |||
documented. | ||||
Please note that treating packets with LSRR as if they did not | Please note that treating packets with LSRR as if they did not | |||
contain this option can result in such packets being sent to a | contain this option can result in such packets being sent to a | |||
different device that the initially intended destination. With | different device than the initially intended destination. With | |||
appropriate ingress filtering this should not open an attack vector | appropriate ingress filtering, this should not open an attack vector | |||
into the infrastructure. Nonetheless, it could result in traffic | into the infrastructure. Nonetheless, it could result in traffic | |||
that would never reach the initially intended destination. Dropping | that would never reach the initially intended destination. Dropping | |||
these packets prevents unnecessary network traffic, and does not make | these packets prevents unnecessary network traffic and does not make | |||
end-to-end communication any worse. | end-to-end communication any worse. | |||
4.4. Strict Source and Record Route (SSRR) (Type = 137) | 4.4. Strict Source and Record Route (SSRR) (Type = 137) | |||
4.4.1. Uses | 4.4.1. Uses | |||
This option allows the originating system to specify a number of | This option allows the originating system to specify a number of | |||
intermediate systems a packet must pass through to get to the | intermediate systems a packet must pass through to get to the | |||
destination host. Additionally, the route followed by the packet is | destination host. Additionally, the route followed by the packet is | |||
recorded in the option, and the destination host (end-system) must | recorded in the option, and the destination host (end-system) must | |||
use the reverse of the path contained in the received SSRR option. | use the reverse of the path contained in the received SSRR option. | |||
This option is similar to the Loose Source and Record Route (LSRR) | This option is similar to the Loose Source and Record Route (LSRR) | |||
option, with the only difference that in the case of SSRR, the route | option, with the only difference that in the case of SSRR, the route | |||
specified in the option is the exact route the packet must take | specified in the option is the exact route the packet must take | |||
(i.e., no other intervening routers are allowed to be in the route). | (i.e., no other intervening routers are allowed to be in the route). | |||
The SSSR option can be of help in debugging some network problems. | The SSRR option can be of help in debugging some network problems. | |||
Some ISP (Internet Service Provider) peering agreements require | Some ISP peering agreements require support for this option in the | |||
support for this option in the routers within the peer of the ISP. | routers within the peer of the ISP. | |||
4.4.2. Option Specification | 4.4.2. Option Specification | |||
Specified in RFC 791 [RFC0791]. | Specified in RFC 791 [RFC0791]. | |||
4.4.3. Threats | 4.4.3. Threats | |||
The SSRR option has the same security implications as the LSRR | The SSRR option has the same security implications as the LSRR | |||
option. Please refer to Section 4.3 for a discussion of such | option. Please refer to Section 4.3 for a discussion of such | |||
security implications. | security implications. | |||
4.4.4. Operational and Interoperability Impact if Blocked | 4.4.4. Operational and Interoperability Impact if Blocked | |||
Network troubleshooting techniques that may employ the SSRR option | Network troubleshooting techniques that may employ the SSRR option | |||
(such as ping or traceroute with the appropriate arguments) would | (such as ping or traceroute with the appropriate arguments) would | |||
break when using the SSRR option (ping and traceroute without IPv4 | break when using the SSRR option. (Ping and traceroute without IPv4 | |||
options are not impacted). Nevertheless, it should be noted that it | options are not impacted.) Nevertheless, it should be noted that it | |||
is virtually impossible to use the SSRR option for trouble-shooting, | is virtually impossible to use the SSRR option for trouble-shooting, | |||
due to widespread dropping of packets that contain such option. | due to widespread dropping of packets that contain such option. | |||
4.4.5. Advice | 4.4.5. Advice | |||
Routers, security gateways, and firewalls SHOULD implement an option- | Routers, security gateways, and firewalls SHOULD implement an option- | |||
specific configuration knob whether packets with this option are | specific configuration knob to select whether packets with this | |||
dropped, packets with this IP option are forwarded as if they did not | option are dropped, packets with this IP option are forwarded as if | |||
contain this IP option, or packets with this option are processed and | they did not contain this IP option, or packets with this option are | |||
forwarded as per [RFC0791]. The default setting for this knob SHOULD | processed and forwarded as per [RFC0791]. The default setting for | |||
be "drop", and the default setting MUST be documented. | this knob SHOULD be "drop", and the default setting MUST be | |||
documented. | ||||
Please note that treating packets with SSRR as if they did not | Please note that treating packets with SSRR as if they did not | |||
contain this option can result in such packets being sent to a | contain this option can result in such packets being sent to a | |||
different device that the initially intended destination. With | different device that the initially intended destination. With | |||
appropriate ingress filtering this should not open an attack vector | appropriate ingress filtering this should not open an attack vector | |||
into the infrastructure. Nonetheless, it could result in traffic | into the infrastructure. Nonetheless, it could result in traffic | |||
that would never reach the initially intended destination. Dropping | that would never reach the initially intended destination. Dropping | |||
these packets prevents unnecessary network traffic, and does not make | these packets prevents unnecessary network traffic, and does not make | |||
end-to-end communication any worse. | end-to-end communication any worse. | |||
skipping to change at page 12, line 15 | skipping to change at page 12, line 9 | |||
4.5.3. Threats | 4.5.3. Threats | |||
This option can be exploited to map the topology of a network. | This option can be exploited to map the topology of a network. | |||
However, the limited space in the IP header limits the usefulness of | However, the limited space in the IP header limits the usefulness of | |||
this option for that purpose. | this option for that purpose. | |||
4.5.4. Operational and Interoperability Impact if Blocked | 4.5.4. Operational and Interoperability Impact if Blocked | |||
Network troubleshooting techniques that may employ the RR option | Network troubleshooting techniques that may employ the RR option | |||
(such as ping with the RR option) would break when using the RR | (such as ping with the RR option) would break when using the RR | |||
option (ping without IPv4 options is not impacted). Nevertheless, it | option. (Ping without IPv4 options is not impacted.) Nevertheless, | |||
should be noted that it is virtually impossible to use such | it should be noted that it is virtually impossible to use such | |||
techniques due to widespread dropping of packets that contain RR | techniques due to widespread dropping of packets that contain RR | |||
options. | options. | |||
4.5.5. Advice | 4.5.5. Advice | |||
Routers, security gateways, and firewalls SHOULD implement an option- | Routers, security gateways, and firewalls SHOULD implement an option- | |||
specific configuration knob whether packets with this option are | specific configuration knob to select whether packets with this | |||
dropped, packets with this IP option are forwarded as if they did not | option are dropped, packets with this IP option are forwarded as if | |||
contain this IP option, or packets with this option are processed and | they did not contain this IP option, or packets with this option are | |||
forwarded as per [RFC0791]. The default setting for this knob SHOULD | processed and forwarded as per [RFC0791]. The default setting for | |||
be "drop", and the default setting MUST be documented. | this knob SHOULD be "drop", and the default setting MUST be | |||
documented. | ||||
4.6. Stream Identifier (Type = 136) (obsolete) | 4.6. Stream Identifier (Type = 136) (obsolete) | |||
The Stream Identifier option originally provided a means for the 16- | The Stream Identifier option originally provided a means for the | |||
bit SATNET stream Identifier to be carried through networks that did | 16-bit SATNET stream Identifier to be carried through networks that | |||
not support the stream concept. | did not support the stream concept. | |||
However, as stated by Section 3.2.1.8 of RFC 1122 [RFC1122] and | However, as stated by Section 3.2.1.8 of RFC 1122 [RFC1122] and | |||
Section 4.2.2.1 of RFC 1812 [RFC1812], this option is obsolete. | Section 4.2.2.1 of RFC 1812 [RFC1812], this option is obsolete. | |||
Therefore, it must be ignored by the processing systems. See also | Therefore, it must be ignored by the processing systems. See also | |||
[IANA-IP] and [RFC6814]. | [IANA-IP] and [RFC6814]. | |||
RFC 791 states that this option appears at most once in a given | RFC 791 states that this option appears at most once in a given | |||
datagram. Therefore, if a packet contains more than one instance of | datagram. Therefore, if a packet contains more than one instance of | |||
this option, it should be dropped, and this event should be logged | this option, it should be dropped, and this event should be logged | |||
(e.g., a counter could be incremented to reflect the packet drop). | (e.g., a counter could be incremented to reflect the packet drop). | |||
skipping to change at page 13, line 26 | skipping to change at page 13, line 24 | |||
Routers, security gateways, and firewalls SHOULD drop IP packets | Routers, security gateways, and firewalls SHOULD drop IP packets | |||
containing a Stream Identifier option. | containing a Stream Identifier option. | |||
4.7. Internet Timestamp (Type = 68) | 4.7. Internet Timestamp (Type = 68) | |||
4.7.1. Uses | 4.7.1. Uses | |||
This option provides a means for recording the time at which each | This option provides a means for recording the time at which each | |||
system (or a specified set of systems) processed this datagram, and | system (or a specified set of systems) processed this datagram, and | |||
may optionally record the addresses of the systems providing the | it may optionally record the addresses of the systems providing the | |||
timestamps. | timestamps. | |||
4.7.2. Option Specification | 4.7.2. Option Specification | |||
Specified by RFC 791 [RFC0791]. | Specified by RFC 791 [RFC0791]. | |||
4.7.3. Threats | 4.7.3. Threats | |||
The timestamp option has a number of security implications [RFC6274]. | The timestamp option has a number of security implications [RFC6274]. | |||
Among them are: | Among them are: | |||
o It allows an attacker to obtain the current time of the systems | o It allows an attacker to obtain the current time of the systems | |||
that process the packet, which the attacker may find useful in a | that process the packet, which the attacker may find useful in a | |||
number of scenarios. | number of scenarios. | |||
o It may be used to map the network topology, in a similar way to | o It may be used to map the network topology in a similar way to the | |||
the IP Record Route option. | IP Record Route option. | |||
o It may be used to fingerprint the operating system in use by a | o It may be used to fingerprint the operating system in use by a | |||
system processing the datagram. | system processing the datagram. | |||
o It may be used to fingerprint physical devices, by analyzing the | o It may be used to fingerprint physical devices by analyzing the | |||
clock skew. | clock skew. | |||
[Kohno2005] describes a technique for fingerprinting devices by | [Kohno2005] describes a technique for fingerprinting devices by | |||
measuring the clock skew. It exploits, among other things, the | measuring the clock skew. It exploits, among other things, the | |||
timestamps that can be obtained by means of the ICMP timestamp | timestamps that can be obtained by means of the ICMP timestamp | |||
request messages [RFC0791]. However, the same fingerprinting method | request messages [RFC0791]. However, the same fingerprinting method | |||
could be implemented with the aid of the Internet Timestamp option. | could be implemented with the aid of the Internet Timestamp option. | |||
4.7.4. Operational and Interoperability Impact if Blocked | 4.7.4. Operational and Interoperability Impact if Blocked | |||
Network troubleshooting techniques that may employ the Internet | Network troubleshooting techniques that may employ the Internet | |||
Timestamp option (such as ping with the Timestamp option) would break | Timestamp option (such as ping with the Timestamp option) would break | |||
when using the Timestamp option (ping without IPv4 options is not | when using the Timestamp option. (Ping without IPv4 options is not | |||
impacted). Nevertheless, it should be noted that it is virtually | impacted.) Nevertheless, it should be noted that it is virtually | |||
impossible to use such techniques due to widespread dropping of | impossible to use such techniques due to widespread dropping of | |||
packets that contain Internet Timestamp options. | packets that contain Internet Timestamp options. | |||
4.7.5. Advice | 4.7.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop IP packets | Routers, security gateways, and firewalls SHOULD drop IP packets | |||
containing an Internet Timestamp option. | containing an Internet Timestamp option. | |||
4.8. Router Alert (Type = 148) | 4.8. Router Alert (Type = 148) | |||
skipping to change at page 14, line 40 | skipping to change at page 14, line 39 | |||
4.8.2. Option Specification | 4.8.2. Option Specification | |||
The Router Alert option is defined in RFC 2113 [RFC2113] and later | The Router Alert option is defined in RFC 2113 [RFC2113] and later | |||
updates to it have been clarified by RFC 5350 [RFC5350]. It contains | updates to it have been clarified by RFC 5350 [RFC5350]. It contains | |||
a 16-bit Value governed by an IANA registry (see [RFC5350]). | a 16-bit Value governed by an IANA registry (see [RFC5350]). | |||
4.8.3. Threats | 4.8.3. Threats | |||
The security implications of the Router Alert option have been | The security implications of the Router Alert option have been | |||
discussed in detail in [RFC6398]. Basically, the Router Alert option | discussed in detail in [RFC6398]. Basically, the Router Alert option | |||
might be exploited to perform a Denial of Service (DoS) attack by | might be exploited to perform a DoS attack by exhausting CPU | |||
exhausting CPU resources at the processing routers. | resources at the processing routers. | |||
4.8.4. Operational and Interoperability Impact if Blocked | 4.8.4. Operational and Interoperability Impact if Blocked | |||
Applications that employ the Router Alert option (such as RSVP | Applications that employ the Router Alert option (such as RSVP | |||
[RFC2205]) would break. | [RFC2205]) would break. | |||
4.8.5. Advice | 4.8.5. Advice | |||
This option SHOULD be allowed only in controlled environments, where | This option SHOULD be allowed only in controlled environments, where | |||
the option can be used safely. [RFC6398] identifies some such | the option can be used safely. [RFC6398] identifies some such | |||
environments. In unsafe environments, packets containing this option | environments. In unsafe environments, packets containing this option | |||
SHOULD be dropped. | SHOULD be dropped. | |||
A given router, security gateway, or firewall system has no way of | A given router, security gateway, or firewall system has no way of | |||
knowing a priori whether this option is valid in its operational | knowing a priori whether this option is valid in its operational | |||
environment. Therefore, routers, security gateways, and firewalls | environment. Therefore, routers, security gateways, and firewalls | |||
SHOULD, by default, ignore the Router Alert option. Additionally, | SHOULD, by default, ignore the Router Alert option. Additionally, | |||
Routers, security gateways, and firewalls SHOULD have a configuration | routers, security gateways, and firewalls SHOULD have a configuration | |||
setting that governs their reaction in the presence of packets | setting that governs their reaction in the presence of packets | |||
containing the Router Alert option. This configuration setting | containing the Router Alert option. This configuration setting | |||
SHOULD allow to honor and process the option, ignore the option, or | SHOULD allow to honor and process the option, ignore the option, or | |||
drop packets containing this option. | drop packets containing this option. | |||
4.9. Probe MTU (Type = 11) (obsolete) | 4.9. Probe MTU (Type = 11) (obsolete) | |||
4.9.1. Uses | 4.9.1. Uses | |||
This option originally provided a mechanism to discover the Path-MTU. | This option originally provided a mechanism to discover the Path-MTU. | |||
It has been declared obsolete. | It has been declared obsolete. | |||
4.9.2. Option Specification | 4.9.2. Option Specification | |||
This option was originally defined in RFC 1063 [RFC1063], and was | This option was originally defined in RFC 1063 [RFC1063] and was | |||
obsoleted with RFC 1191 [RFC1191]. This option is now obsolete, as | obsoleted with RFC 1191 [RFC1191]. This option is now obsolete, as | |||
RFC 1191 obsoletes RFC 1063 without using IP options. | RFC 1191 obsoletes RFC 1063 without using IP options. | |||
4.9.3. Threats | 4.9.3. Threats | |||
This option is obsolete. This option could have been exploited to | This option is obsolete. This option could have been exploited to | |||
cause a host to set its PMTU estimate to an inordinately low or an | cause a host to set its Path MTU (PMTU) estimate to an inordinately | |||
inordinately high value, thereby causing performance problems. | low or an inordinately high value, thereby causing performance | |||
problems. | ||||
4.9.4. Operational and Interoperability Impact if Blocked | 4.9.4. Operational and Interoperability Impact if Blocked | |||
None | None | |||
This option is NOT employed with the modern "Path MTU Discovery" | This option is NOT employed with the modern "Path MTU Discovery" | |||
(PMTUD) mechanism [RFC1191], which employs special ICMP messages | (PMTUD) mechanism [RFC1191], which employs special ICMP messages | |||
(Type 3, Code 4) in combination with the IP DF bit. PLPMTUD | (Type 3, Code 4) in combination with the IP DF bit. Packetization | |||
[RFC4821] can perform PMTUD without the need of any special | Layer PMTUD (PLPMTUD) [RFC4821] can perform PMTUD without the need | |||
packets. | for any special packets. | |||
4.9.5. Advice | 4.9.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop IP packets that | Routers, security gateways, and firewalls SHOULD drop IP packets that | |||
contain a Probe MTU option. | contain a Probe MTU option. | |||
4.10. Reply MTU (Type = 12) (obsolete) | 4.10. Reply MTU (Type = 12) (obsolete) | |||
4.10.1. Uses | 4.10.1. Uses | |||
This option and originally provided a mechanism to discover the Path- | This option originally provided a mechanism to discover the Path-MTU. | |||
MTU. It is now obsolete. | It is now obsolete. | |||
4.10.2. Option Specification | 4.10.2. Option Specification | |||
This option was originally defined in RFC 1063 [RFC1063], and was | This option was originally defined in RFC 1063 [RFC1063] and was | |||
obsoleted with RFC 1191 [RFC1191]. This option is now obsolete, as | obsoleted with RFC 1191 [RFC1191]. This option is now obsolete, as | |||
RFC 1191 obsoletes RFC 1063 without using IP options. | RFC 1191 obsoletes RFC 1063 without using IP options. | |||
4.10.3. Threats | 4.10.3. Threats | |||
This option is obsolete. This option could have been exploited to | This option is obsolete. This option could have been exploited to | |||
cause a host to set its PMTU estimate to an inordinately low or an | cause a host to set its PMTU estimate to an inordinately low or an | |||
inordinately high value, thereby causing performance problems. | inordinately high value, thereby causing performance problems. | |||
4.10.4. Operational and Interoperability Impact if Blocked | 4.10.4. Operational and Interoperability Impact if Blocked | |||
skipping to change at page 17, line 9 | skipping to change at page 17, line 9 | |||
4.11.2. Option Specification | 4.11.2. Option Specification | |||
This option was originally specified by RFC 1393 [RFC1393] as | This option was originally specified by RFC 1393 [RFC1393] as | |||
"experimental", and it was never widely deployed on the public | "experimental", and it was never widely deployed on the public | |||
Internet. This option has been formally obsoleted by [RFC6814]. | Internet. This option has been formally obsoleted by [RFC6814]. | |||
4.11.3. Threats | 4.11.3. Threats | |||
This option is obsolete. Because this option required each router in | This option is obsolete. Because this option required each router in | |||
the path both to provide special processing and to send an ICMP | the path both to provide special processing and to send an ICMP | |||
message, it could have been exploited to perform a Denial of Service | message, it could have been exploited to perform a DoS attack by | |||
(DoS) attack by exhausting CPU resources at the processing routers. | exhausting CPU resources at the processing routers. | |||
4.11.4. Operational and Interoperability Impact if Blocked | 4.11.4. Operational and Interoperability Impact if Blocked | |||
None | None | |||
4.11.5. Advice | 4.11.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop IP packets that | Routers, security gateways, and firewalls SHOULD drop IP packets that | |||
contain a Traceroute option. | contain a Traceroute option. | |||
4.12. DoD Basic Security Option (Type = 130) | 4.12. DoD Basic Security Option (Type = 130) | |||
4.12.1. Uses | 4.12.1. Uses | |||
This option is used by Multi-Level-Secure (MLS) end-systems and | This option [RFC1108] is used by Multi-Level Secure (MLS) end-systems | |||
intermediate systems in specific environments to [RFC1108]: | and intermediate systems in specific environments to: | |||
o Transmit from source to destination in a network standard | o transmit from source to destination in a network standard | |||
representation the common security labels required by computer | representation the common security labels required by computer | |||
security models [Landwehr81], | security models [Landwehr81], | |||
o validate the datagram as appropriate for transmission from the | o validate the datagram as appropriate for transmission from the | |||
source and delivery to the destination, and, | source and delivery to the destination, and, | |||
o ensure that the route taken by the datagram is protected to the | o ensure that the route taken by the datagram is protected to the | |||
level required by all protection authorities indicated on the | level required by all protection authorities indicated on the | |||
datagram. | datagram. | |||
The DoD Basic Security Option (BSO) was implemented in IRIX | The DoD Basic Security Option (BSO) was implemented in IRIX | |||
[IRIX2008] and is currently implemented in a number of operating | [IRIX2008] and is currently implemented in a number of operating | |||
systems (e.g., Security-Enhanced Linux [SELinux2008], Solaris | systems (e.g., Security-Enhanced Linux [SELinux2008], Solaris | |||
[Solaris2008], and Cisco IOS [Cisco-IPSO]). It is also currently | [Solaris2008], and Cisco IOS [Cisco-IPSO]). It is also currently | |||
deployed in a number of high-security networks. These networks are | deployed in a number of high-security networks. These networks are | |||
typically either in physically secure locations, protected by | typically either in physically secure locations, protected by | |||
military/governmental communications security equipment, or both. | military/governmental communications security equipment, or both. | |||
Such networks are typically built using commercial off-the-shelf | Such networks are typically built using commercial off-the-shelf | |||
(COTS) IP routers and Ethernet switches, but are not normally | (COTS) IP routers and Ethernet switches, but they are not normally | |||
interconnected with the global public Internet. Multi-Level Secure | interconnected with the global public Internet. MLS systems are much | |||
(MLS) systems are much more widely deployed now than they were at the | more widely deployed now than they were at the time the then-IESG | |||
time the then-IESG decided to remove IPSO (IP Security Options) from | decided to remove IPSO (IP Security Options) from the IETF Standards | |||
the IETF standards-track. Since nearly all MLS systems also support | Track. Since nearly all MLS systems also support IPSO BSO and IPSO | |||
IPSO BSO and IPSO ESO, this option is believed to have more | ESO, this option is believed to have more deployment now than when | |||
deployment now than when the IESG removed this option from the IETF | the IESG removed this option from the IETF Standards Track. | |||
standards-track. [RFC5570] describes a similar option recently | [RFC5570] describes a similar option recently defined for IPv6 and | |||
defined for IPv6 and has much more detailed explanations of how | has much more detailed explanations of how sensitivity label options | |||
sensitivity label options are used in real-world deployments. | are used in real-world deployments. | |||
4.12.2. Option Specification | 4.12.2. Option Specification | |||
It is specified by RFC 1108 [RFC1108]], which obsoleted RFC 1038 | It is specified by RFC 1108 [RFC1108], which obsoleted RFC 1038 | |||
[RFC1038] (which in turn obsoleted the Security Option defined in RFC | [RFC1038] (which in turn obsoleted the Security Option defined in RFC | |||
791 [RFC0791]). | 791 [RFC0791]). | |||
RFC 791 [RFC0791] defined the "Security Option" (Type = 130), | RFC 791 [RFC0791] defined the "Security Option" (Type = 130), | |||
which used the same option type as the DoD Basic Security option | which used the same option type as the DoD Basic Security option | |||
discussed in this section. Later, RFC 1038 [RFC1038] revised the | discussed in this section. Later, RFC 1038 [RFC1038] revised the | |||
IP security options, and in turn was obsoleted by RFC 1108 | IP security options, and in turn was obsoleted by RFC 1108 | |||
[RFC1108]. The "Security Option" specified in RFC 791 is | [RFC1108]. The "Security Option" specified in RFC 791 is | |||
considered obsolete by Section 3.2.1.8 of RFC 1122 [RFC1122] and | considered obsolete by Section 3.2.1.8 of RFC 1122 [RFC1122] and | |||
Section 4.2.2.1 of RFC 1812 [RFC1812], and therefore the | Section 4.2.2.1 of RFC 1812 [RFC1812], and therefore the | |||
discussion in this section is focused on the DoD Basic Security | discussion in this section is focused on the DoD Basic Security | |||
option specified by RFC 1108 [RFC1108]. | option specified by RFC 1108 [RFC1108]. | |||
Section 4.2.2.1 of RFC 1812 states that routers "SHOULD implement | Section 4.2.2.1 of RFC 1812 states that routers "SHOULD implement | |||
this option". | [this option]". | |||
Some private IP networks consider IP router-based per-interface | Some private IP networks consider IP router-based per-interface | |||
selective filtering of packets based on (a) the presence of an | selective filtering of packets based on (a) the presence of an | |||
IPSO option (including BSO and ESO) and (b) based on the contents | IPSO option (including BSO and ESO) and (b) the contents of that | |||
of that IPSO option to be important for operational security | IPSO option to be important for operational security reasons. The | |||
reasons. The recent IPv6 CALIPSO option specification discusses | recent IPv6 Common Architecture Label IPv6 Security Option | |||
this in additional detail, albeit in an IPv6 context [RFC5570]. | (CALIPSO) specification discusses this in additional detail, | |||
albeit in an IPv6 context [RFC5570]. | ||||
Such private IP networks commonly are built using both commercial | Such private IP networks commonly are built using both commercial | |||
and open-source products - for hosts, guards, firewalls, switches, | and open-source products -- for hosts, guards, firewalls, | |||
routers, etc. Some commercial IP routers support this option, as | switches, routers, etc. Some commercial IP routers support this | |||
do some IP routers which are built on top of Multi-Level Secure | option, as do some IP routers that are built on top of MLS | |||
(MLS) operating systems (e.g., on top of Trusted Solaris | operating systems (e.g., on top of Trusted Solaris [Solaris2008] | |||
[Solaris2008] or Security-Enhanced Linux [SELinux2008]). | or Security-Enhanced Linux [SELinux2008]). | |||
For example, many Cisco routers that run Cisco IOS include support | For example, many Cisco routers that run Cisco IOS include support | |||
for selectively filtering packets that contain the IP Security | for selectively filtering packets that contain the IP Security | |||
Options (IPSO) with per-interface granularity. This capability | Options (IPSO) with per-interface granularity. This capability | |||
has been present in many Cisco routers since the early 1990s | has been present in many Cisco routers since the early 1990s | |||
[Cisco-IPSO-Cmds]. Some government sector products reportedly | [Cisco-IPSO-Cmds]. Some government-sector products reportedly | |||
also support the IP Security Options (IPSO), for example CANEWARE | also support the IP Security Options (IPSO), for example, CANEWARE | |||
[RFC4949]. | [RFC4949]. | |||
Support for the IPSO Basic Security Option also is included in the | Support for the IPSO Basic Security Option also is included in the | |||
"IPsec Configuration Policy Information Model" [RFC3585] and in | "IPsec Configuration Policy Information Model" [RFC3585] and in | |||
the "IPsec Security Policy Database Configuration MIB" [RFC4807]. | the "IPsec Security Policy Database Configuration MIB" [RFC4807]. | |||
Section 4.6.1 of the IP Security Domain of Interpretation | Section 4.6.1 of the IP Security Domain of Interpretation | |||
[RFC2407] includes support for labeled IPsec security associations | [RFC2407] includes support for labeled IPsec security associations | |||
compatible with the IP Security Options. | compatible with the IP Security Options. (Note: RFC 2407 was | |||
obsoleted by [RFC4306], which was obsoleted by [RFC5996].) | ||||
4.12.3. Threats | 4.12.3. Threats | |||
Presence of this option in a packet does not by itself create any | Presence of this option in a packet does not by itself create any | |||
specific new threat. Packets with this option ought not normally be | specific new threat. Packets with this option ought not normally be | |||
seen on the global public Internet. | seen on the global public Internet. | |||
4.12.4. Operational and Interoperability Impact if Blocked | 4.12.4. Operational and Interoperability Impact if Blocked | |||
If packets with this option are blocked or if the option is stripped | If packets with this option are blocked or if the option is stripped | |||
from the packet during transmission from source to destination, then | from the packet during transmission from source to destination, then | |||
the packet itself is likely to be dropped by the receiver because it | the packet itself is likely to be dropped by the receiver because it | |||
isn't properly labeled. In some cases, the receiver might receive | is not properly labeled. In some cases, the receiver might receive | |||
the packet but associate an incorrect sensitivity label with the | the packet but associate an incorrect sensitivity label with the | |||
received data from the packet whose BSO was stripped by an | received data from the packet whose BSO was stripped by an | |||
intermediate router or firewall. Associating an incorrect | intermediate router or firewall. Associating an incorrect | |||
sensitivity label can cause the received information either to be | sensitivity label can cause the received information either to be | |||
handled as more sensitive than it really is ("upgrading") or as less | handled as more sensitive than it really is ("upgrading") or as less | |||
sensitive than it really is ("downgrading"), either of which is | sensitive than it really is ("downgrading"), either of which is | |||
problematic. | problematic. | |||
4.12.5. Advice | 4.12.5. Advice | |||
skipping to change at page 19, line 51 | skipping to change at page 20, line 5 | |||
is needed if either the option is dropped or IP packets containing | is needed if either the option is dropped or IP packets containing | |||
this option are dropped, but no harm results if the option is carried | this option are dropped, but no harm results if the option is carried | |||
in environments where it is not needed, the default configuration | in environments where it is not needed, the default configuration | |||
SHOULD NOT (a) modify or remove this IP option or (b) drop an IP | SHOULD NOT (a) modify or remove this IP option or (b) drop an IP | |||
packet because the IP packet contains this option. | packet because the IP packet contains this option. | |||
A given IP router, security gateway, or firewall MAY be configured to | A given IP router, security gateway, or firewall MAY be configured to | |||
drop this option or to drop IP packets containing this option in an | drop this option or to drop IP packets containing this option in an | |||
environment known to not use this option. | environment known to not use this option. | |||
For auditing reasons, Routers, security gateways, and firewalls | For auditing reasons, routers, security gateways, and firewalls | |||
SHOULD be capable of logging the numbers of packets containing the | SHOULD be capable of logging the numbers of packets containing the | |||
BSO on a per-interface basis. Also, Routers, security gateways, and | BSO on a per-interface basis. Also, routers, security gateways, and | |||
firewalls SHOULD be capable of dropping packets based on the BSO | firewalls SHOULD be capable of dropping packets based on the BSO | |||
presence as well as the BSO values. | presence as well as the BSO values. | |||
4.13. DoD Extended Security Option (Type = 133) | 4.13. DoD Extended Security Option (Type = 133) | |||
4.13.1. Uses | 4.13.1. Uses | |||
This option permits additional security labeling information, beyond | This option permits additional security labeling information, beyond | |||
that present in the Basic Security Option (Section 4.12), to be | that present in the Basic Security Option (Section 4.12), to be | |||
supplied in an IP datagram to meet the needs of registered | supplied in an IP datagram to meet the needs of registered | |||
skipping to change at page 20, line 30 | skipping to change at page 20, line 33 | |||
[RFC1108]. | [RFC1108]. | |||
Some private IP networks consider IP router-based per-interface | Some private IP networks consider IP router-based per-interface | |||
selective filtering of packets based on (a) the presence of an | selective filtering of packets based on (a) the presence of an | |||
IPSO option (including BSO and ESO) and (b) based on the contents | IPSO option (including BSO and ESO) and (b) based on the contents | |||
of that IPSO option to be important for operational security | of that IPSO option to be important for operational security | |||
reasons. The recent IPv6 CALIPSO option specification discusses | reasons. The recent IPv6 CALIPSO option specification discusses | |||
this in additional detail, albeit in an IPv6 context [RFC5570]. | this in additional detail, albeit in an IPv6 context [RFC5570]. | |||
Such private IP networks commonly are built using both commercial | Such private IP networks commonly are built using both commercial | |||
and open-source products - for hosts, guards, firewalls, switches, | and open-source products -- for hosts, guards, firewalls, | |||
routers, etc. Some commercial IP routers support this option, as | switches, routers, etc. Some commercial IP routers support this | |||
do some IP routers which are built on top of Multi-Level Secure | option, as do some IP routers that are built on top of MLS | |||
(MLS) operating systems (e.g., on top of Trusted Solaris | operating systems (e.g., on top of Trusted Solaris [Solaris2008] | |||
[Solaris2008] or Security-Enhanced Linux [SELinux2008]). | or Security-Enhanced Linux [SELinux2008]). | |||
For example, many Cisco routers that run Cisco IOS include support | For example, many Cisco routers that run Cisco IOS include support | |||
for selectively filtering packets that contain the IP Security | for selectively filtering packets that contain the IP Security | |||
Options (IPSO) with per-interface granularity. This capability | Options (IPSO) with per-interface granularity. This capability | |||
has been present in many Cisco routers since the early 1990s | has been present in many Cisco routers since the early 1990s | |||
[Cisco-IPSO-Cmds]. Some government sector products reportedly | [Cisco-IPSO-Cmds]. Some government sector products reportedly | |||
also support the IP Security Options (IPSO), for example CANEWARE | also support the IP Security Options (IPSO), for example, CANEWARE | |||
[RFC4949]. | [RFC4949]. | |||
Support for the IPSO Extended Security Option also is included in | Support for the IPSO Extended Security Option also is included in | |||
the "IPsec Configuration Policy Information Model" [RFC3585] and | the "IPsec Configuration Policy Information Model" [RFC3585] and | |||
in the "IPsec Security Policy Database Configuration MIB" | in the "IPsec Security Policy Database Configuration MIB" | |||
[RFC4807]. Section 4.6.1 of the IP Security Domain of | [RFC4807]. Section 4.6.1 of the IP Security Domain of | |||
Interpretation [RFC2407] includes support for labeled IPsec | Interpretation [RFC2407] includes support for labeled IPsec | |||
security associations compatible with the IP Security Options. | security associations compatible with the IP Security Options. | |||
4.13.3. Threats | 4.13.3. Threats | |||
Presence of this option in a packet does not by itself create any | Presence of this option in a packet does not by itself create any | |||
specific new threat. Packets with this option ought not normally be | specific new threat. Packets with this option ought not normally be | |||
seen on the global public Internet. | seen on the global public Internet. | |||
4.13.4. Operational and Interoperability Impact if Blocked | 4.13.4. Operational and Interoperability Impact if Blocked | |||
If packets with this option are blocked or if the option is stripped | If packets with this option are blocked or if the option is stripped | |||
from the packet during transmission from source to destination, then | from the packet during transmission from source to destination, then | |||
the packet itself is likely to be dropped by the receiver because it | the packet itself is likely to be dropped by the receiver because it | |||
isn't properly labeled. In some cases, the receiver might receive | is not properly labeled. In some cases, the receiver might receive | |||
the packet but associate an incorrect sensitivity label with the | the packet but associate an incorrect sensitivity label with the | |||
received data from the packet whose ESO was stripped by an | received data from the packet whose ESO was stripped by an | |||
intermediate router or firewall. Associating an incorrect | intermediate router or firewall. Associating an incorrect | |||
sensitivity label can cause the received information either to be | sensitivity label can cause the received information either to be | |||
handled as more sensitive than it really is ("upgrading") or as less | handled as more sensitive than it really is ("upgrading") or as less | |||
sensitive than it really is ("downgrading"), either of which is | sensitive than it really is ("downgrading"), either of which is | |||
problematic. | problematic. | |||
4.13.5. Advice | 4.13.5. Advice | |||
skipping to change at page 21, line 44 | skipping to change at page 21, line 44 | |||
is needed if either the option is dropped or IP packets containing | is needed if either the option is dropped or IP packets containing | |||
this option are dropped, but no harm results if the option is carried | this option are dropped, but no harm results if the option is carried | |||
in environments where it is not needed, the default configuration | in environments where it is not needed, the default configuration | |||
SHOULD NOT (a) modify or remove this IP option or (b) drop an IP | SHOULD NOT (a) modify or remove this IP option or (b) drop an IP | |||
packet because the IP packet contains this option. | packet because the IP packet contains this option. | |||
A given IP router, security gateway, or firewall MAY be configured to | A given IP router, security gateway, or firewall MAY be configured to | |||
drop this option or to drop IP packets containing this option in an | drop this option or to drop IP packets containing this option in an | |||
environment known to not use this option. | environment known to not use this option. | |||
For auditing reasons, Routers, security gateways, and firewalls | For auditing reasons, routers, security gateways, and firewalls | |||
SHOULD be capable of logging the numbers of packets containing the | SHOULD be capable of logging the numbers of packets containing the | |||
ESO on a per-interface basis. Also, Routers, security gateways, and | ESO on a per-interface basis. Also, routers, security gateways, and | |||
firewalls SHOULD be capable of dropping packets based on the ESO | firewalls SHOULD be capable of dropping packets based on the ESO | |||
presence as well as the ESO values. | presence as well as the ESO values. | |||
4.14. Commercial IP Security Option (CIPSO) (Type = 134) | 4.14. Commercial IP Security Option (CIPSO) (Type = 134) | |||
4.14.1. Uses | 4.14.1. Uses | |||
This option was proposed by the Trusted Systems Interoperability | This option was proposed by the Trusted Systems Interoperability | |||
Group (TSIG), with the intent of meeting trusted networking | Group (TSIG), with the intent of meeting trusted networking | |||
requirements for the commercial trusted systems market place. | requirements for the commercial trusted systems marketplace. | |||
It was implemented in IRIX [IRIX2008] and is currently implemented in | It was implemented in IRIX [IRIX2008] and is currently implemented in | |||
a number of operating systems (e.g., Security-Enhanced Linux | a number of operating systems (e.g., Security-Enhanced Linux | |||
[SELinux2008], and Solaris [Solaris2008]). It is also currently | [SELinux2008] and Solaris [Solaris2008]). It is also currently | |||
deployed in a number of high-security networks. | deployed in a number of high-security networks. | |||
4.14.2. Option Specification | 4.14.2. Option Specification | |||
This option is specified in [I-D.ietf-cipso-ipsecurity] and | This option is specified in [CIPSO] and [FIPS1994]. There are zero | |||
[FIPS1994]. There are zero known IP router implementations of CIPSO. | known IP router implementations of CIPSO. Several MLS operating | |||
Several MLS operating systems support CIPSO, generally the same MLS | systems support CIPSO, generally the same MLS operating systems that | |||
operating systems that support IPSO. | support IPSO. | |||
The TSIG proposal was taken to the Commercial Internet Security | The TSIG proposal was taken to the Commercial Internet Security | |||
Option (CIPSO) Working Group of the IETF [CIPSOWG1994], and an | Option (CIPSO) Working Group of the IETF [CIPSOWG1994], and an | |||
Internet-Draft was produced [I-D.ietf-cipso-ipsecurity]. The | Internet-Draft was produced [CIPSO]. The Internet-Draft was never | |||
Internet-Draft was never published as an RFC, but the proposal was | published as an RFC, but the proposal was later standardized by | |||
later standardized by the U.S. National Institute of Standards and | the U.S. National Institute of Standards and Technology (NIST) as | |||
Technology (NIST) as "Federal Information Processing Standard | "Federal Information Processing Standard Publication 188" | |||
Publication 188" [FIPS1994]. | [FIPS1994]. | |||
4.14.3. Threats | 4.14.3. Threats | |||
Presence of this option in a packet does not by itself create any | Presence of this option in a packet does not by itself create any | |||
specific new threat. Packets with this option ought not normally be | specific new threat. Packets with this option ought not normally be | |||
seen on the global public Internet. | seen on the global public Internet. | |||
4.14.4. Operational and Interoperability Impact if Blocked | 4.14.4. Operational and Interoperability Impact if Blocked | |||
If packets with this option are blocked or if the option is stripped | If packets with this option are blocked or if the option is stripped | |||
from the packet during transmission from source to destination, then | from the packet during transmission from source to destination, then | |||
the packet itself is likely to be dropped by the receiver because it | the packet itself is likely to be dropped by the receiver because it | |||
isn't properly labeled. In some cases, the receiver might receive | is not properly labeled. In some cases, the receiver might receive | |||
the packet but associate an incorrect sensitivity label with the | the packet but associate an incorrect sensitivity label with the | |||
received data from the packet whose CIPSO was stripped by an | received data from the packet whose CIPSO was stripped by an | |||
intermediate router or firewall. Associating an incorrect | intermediate router or firewall. Associating an incorrect | |||
sensitivity label can cause the received information either to be | sensitivity label can cause the received information either to be | |||
handled as more sensitive than it really is ("upgrading") or as less | handled as more sensitive than it really is ("upgrading") or as less | |||
sensitive than it really is ("downgrading"), either of which is | sensitive than it really is ("downgrading"), either of which is | |||
problematic. | problematic. | |||
4.14.5. Advice | 4.14.5. Advice | |||
Because of the design of this option, with variable syntax and | Because of the design of this option, with variable syntax and | |||
variable length, it is not practical to support specialized filtering | variable length, it is not practical to support specialized filtering | |||
using the CIPSO information. No routers or firewalls are known to | using the CIPSO information. No routers or firewalls are known to | |||
support this option. However, Routers, security gateways, and | support this option. However, routers, security gateways, and | |||
firewalls SHOULD NOT by default modify or remove this option from IP | firewalls SHOULD NOT by default modify or remove this option from IP | |||
packets and SHOULD NOT by default drop packets because they contain | packets and SHOULD NOT by default drop packets because they contain | |||
this option. For auditing reasons, routers, security gateways, and | this option. For auditing reasons, routers, security gateways, and | |||
firewalls SHOULD be capable of logging the numbers of packets | firewalls SHOULD be capable of logging the numbers of packets | |||
containing the CIPSO on a per-interface basis. Also, Routers, | containing the CIPSO on a per-interface basis. Also, routers, | |||
security gateways, and firewalls SHOULD be capable of dropping | security gateways, and firewalls SHOULD be capable of dropping | |||
packets based on the CIPSO presence. | packets based on the CIPSO presence. | |||
4.15. VISA (Type = 142) | 4.15. VISA (Type = 142) | |||
4.15.1. Uses | 4.15.1. Uses | |||
This options was part of an experiment at USC and was never widely | This options was part of an experiment at the University of Southern | |||
deployed. | California (USC) and was never widely deployed. | |||
4.15.2. Option Specification | 4.15.2. Option Specification | |||
The original option specification is not publicly available. This | The original option specification is not publicly available. This | |||
option has been formally obsoleted by [RFC6814]. | option has been formally obsoleted by [RFC6814]. | |||
4.15.3. Threats | 4.15.3. Threats | |||
Not possible to determine (other the general security implications of | Not possible to determine (other than the general security | |||
IP options discussed in Section 3), since the corresponding | implications of IP options discussed in Section 3), since the | |||
specification is not publicly available. | corresponding specification is not publicly available. | |||
4.15.4. Operational and Interoperability Impact if Blocked | 4.15.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.15.5. Advice | 4.15.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop IP packets that | Routers, security gateways, and firewalls SHOULD drop IP packets that | |||
contain this option. | contain this option. | |||
4.16. Extended Internet Protocol (Type = 145) | 4.16. Extended Internet Protocol (Type = 145) | |||
4.16.1. Uses | 4.16.1. Uses | |||
The EIP option was introduced by one of the proposals submitted | The EIP option was introduced by one of the proposals submitted | |||
during the IPng efforts to address the problem of IPv4 address | during the IP Next Generation (IPng) efforts to address the problem | |||
exhaustion. | of IPv4 address exhaustion. | |||
4.16.2. Option Specification | 4.16.2. Option Specification | |||
Specified in [RFC1385]. This option has been formally obsoleted by | Specified in [RFC1385]. This option has been formally obsoleted by | |||
[RFC6814]. | [RFC6814]. | |||
4.16.3. Threats | 4.16.3. Threats | |||
This option is obsolete. This option was used (or was intended to be | This option is obsolete. This option was used (or was intended to be | |||
used) to signal that a packet superficially similar to an IPv4 packet | used) to signal that a packet superficially similar to an IPv4 packet | |||
actually containted a different protocol, opening up the possibility | actually contained a different protocol, opening up the possibility | |||
that an IPv4 node that simply ignored this option would process a | that an IPv4 node that simply ignored this option would process a | |||
received packet in a manner inconsistent with the intent of the | received packet in a manner inconsistent with the intent of the | |||
sender. There are no know threats arising from this option, other | sender. There are no known threats arising from this option, other | |||
than the general security implications of IP options discussed in | than the general security implications of IP options discussed in | |||
Section 3. | Section 3. | |||
4.16.4. Operational and Interoperability Impact if Blocked | 4.16.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.16.5. Advice | 4.16.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop packets that | Routers, security gateways, and firewalls SHOULD drop packets that | |||
skipping to change at page 24, line 45 | skipping to change at page 24, line 45 | |||
submitted during the IPng efforts to address the problem of IPv4 | submitted during the IPng efforts to address the problem of IPv4 | |||
address exhaustion. | address exhaustion. | |||
4.17.2. Option Specification | 4.17.2. Option Specification | |||
Specified in [RFC1475]. This option has been formally obsoleted by | Specified in [RFC1475]. This option has been formally obsoleted by | |||
[RFC6814]. | [RFC6814]. | |||
4.17.3. Threats | 4.17.3. Threats | |||
There are no know threats arising from this option, other than the | There are no known threats arising from this option, other than the | |||
general security implications of IP options discussed in Section 3. | general security implications of IP options discussed in Section 3. | |||
4.17.4. Operational and Interoperability Impact if Blocked | 4.17.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.17.5. Advice | 4.17.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop packets that | Routers, security gateways, and firewalls SHOULD drop packets that | |||
contain this option. | contain this option. | |||
skipping to change at page 25, line 25 | skipping to change at page 25, line 25 | |||
addresses included in the option. | addresses included in the option. | |||
4.18.2. Option Specification | 4.18.2. Option Specification | |||
This option is specified in RFC 1770 [RFC1770]. It has been formally | This option is specified in RFC 1770 [RFC1770]. It has been formally | |||
obsoleted by [RFC6814]. | obsoleted by [RFC6814]. | |||
4.18.3. Threats | 4.18.3. Threats | |||
This option could have been exploited for bandwidth-amplification in | This option could have been exploited for bandwidth-amplification in | |||
Denial of Service (DoS) attacks. | DoS attacks. | |||
4.18.4. Operational and Interoperability Impact if Blocked | 4.18.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.18.5. Advice | 4.18.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop IP packets that | Routers, security gateways, and firewalls SHOULD drop IP packets that | |||
contain a Sender Directed Multi-Destination Delivery option. | contain a Sender Directed Multi-Destination Delivery option. | |||
4.19. Dynamic Packet State (Type = 151) | 4.19. Dynamic Packet State (Type = 151) | |||
4.19.1. Uses | 4.19.1. Uses | |||
The Dynamic Packet State option was used to specify specified Dynamic | The Dynamic Packet State option was used to specify the Dynamic | |||
Packet State (DPS) in the context of the differentiated service | Packet State (DPS) in the context of the differentiated services | |||
architecture. | architecture. | |||
4.19.2. Option Specification | 4.19.2. Option Specification | |||
The Dynamic Packet State option was specified in | The Dynamic Packet State option was specified in [DIFFSERV-DPS]. The | |||
[I-D.stoica-diffserv-dps]. The aforementioned document was meant to | aforementioned document was meant to be published as "Experimental", | |||
be published as "Experimental", but never made it into an RFC. This | but never made it into an RFC. This option has been formally | |||
option has been formally obsoleted by [RFC6814]. | obsoleted by [RFC6814]. | |||
4.19.3. Threats | 4.19.3. Threats | |||
Possible threats include theft of service and Denial of Service. | Possible threats include theft of service and denial of service. | |||
However, we note that is option has never been widely implemented or | However, we note that this option has never been widely implemented | |||
deployed. | or deployed. | |||
4.19.4. Operational and Interoperability Impact if Blocked | 4.19.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.19.5. Advice | 4.19.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop packets that | Routers, security gateways, and firewalls SHOULD drop packets that | |||
contain this option. | contain this option. | |||
4.20. Upstream Multicast Pkt. (Type = 152) | 4.20. Upstream Multicast Pkt. (Type = 152) | |||
4.20.1. Uses | 4.20.1. Uses | |||
This option was meant to solve the problem of doing upstream | This option was meant to solve the problem of doing upstream | |||
forwarding of multicast packets on a multi-access LAN. | forwarding of multicast packets on a multi-access LAN. | |||
4.20.2. Option Specification | 4.20.2. Option Specification | |||
This option was originally specified in [I-D.farinacci-bidir-pim]. | This option was originally specified in [BIDIR-TREES]. It was never | |||
It was never formally standardized in the RFC series, and was never | formally standardized in the RFC series and was never widely | |||
widely implemented and deployed. Its use was obsoleted by [RFC5015], | implemented and deployed. Its use was obsoleted by [RFC5015], which | |||
which employs a control plane mechanism to solve the problem of doing | employs a control-plane mechanism to solve the problem of doing | |||
upstream forwarding of multicast packets on a multi-access LAN. This | upstream forwarding of multicast packets on a multi-access LAN. This | |||
option has been formally obsoleted by [RFC6814]. | option has been formally obsoleted by [RFC6814]. | |||
4.20.3. Threats | 4.20.3. Threats | |||
This option is obsolete. A router that ignored this option instead | This option is obsolete. A router that ignored this option instead | |||
of processing it as specified in [I-D.farinacci-bidir-pim] could have | of processing it as specified in [BIDIR-TREES] could have forwarded | |||
forwarded multicast packets to an unintended destination. | multicast packets to an unintended destination. | |||
4.20.4. Operational and Interoperability Impact if Blocked | 4.20.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.20.5. Advice | 4.20.5. Advice | |||
Routers, security gateways, and firewalls SHOULD drop packets that | Routers, security gateways, and firewalls SHOULD drop packets that | |||
contain this option. | contain this option. | |||
skipping to change at page 27, line 24 | skipping to change at page 27, line 24 | |||
4.21.2. Option Specification | 4.21.2. Option Specification | |||
Specified in RFC 4782 [RFC4782], on the "Experimental" track. | Specified in RFC 4782 [RFC4782], on the "Experimental" track. | |||
4.21.3. Threats | 4.21.3. Threats | |||
Section 9.6 of [RFC4782] notes that Quick-Start is vulnerable to two | Section 9.6 of [RFC4782] notes that Quick-Start is vulnerable to two | |||
kinds of attacks: | kinds of attacks: | |||
o Attacks to increase the routers' processing and state load, and, | o attacks to increase the routers' processing and state load, and, | |||
o attacks with bogus Quick-Start Requests to temporarily tie up | o attacks with bogus Quick-Start Requests to temporarily tie up | |||
available Quick-Start bandwidth, preventing routers from approving | available Quick-Start bandwidth, preventing routers from approving | |||
Quick-Start Requests from other connections. | Quick-Start Requests from other connections. | |||
4.21.4. Operational and Interoperability Impact if Blocked | 4.21.4. Operational and Interoperability Impact if Blocked | |||
The Quick-Start functionality would be disabled, and additional | The Quick-Start functionality would be disabled, and additional | |||
delays in e.g., TCP's connection establishment could be introduced | delays in TCP's connection establishment (for example) could be | |||
(please see Section 4.7.2 of [RFC4782]. We note, however, that | introduced. (Please see Section 4.7.2 of [RFC4782].) We note, | |||
Quick-Start has been proposed as mechanism that could be of use in | however, that Quick-Start has been proposed as a mechanism that could | |||
controlled environments, and not as a mechanism that would be | be of use in controlled environments, and not as a mechanism that | |||
intended or appropriate for ubiquitous deployment in the global | would be intended or appropriate for ubiquitous deployment in the | |||
Internet [RFC4782]. | global Internet [RFC4782]. | |||
4.21.5. Advice | 4.21.5. Advice | |||
A given router, security gateway, or firewall system has no way of | A given router, security gateway, or firewall system has no way of | |||
knowing a priori whether this option is valid in its operational | knowing a priori whether this option is valid in its operational | |||
environment. Therefore, routers, security gateways, and firewalls | environment. Therefore, routers, security gateways, and firewalls | |||
SHOULD, by default, ignore the Quick Start option. Additionally, | SHOULD, by default, ignore the Quick-Start option. Additionally, | |||
Routers, security gateways, and firewalls SHOULD have a configuration | routers, security gateways, and firewalls SHOULD have a configuration | |||
setting that governs their reaction in the presence of packets | setting that governs their reaction in the presence of packets | |||
containing the Quick Start option. This configuration setting SHOULD | containing the Quick-Start option. This configuration setting SHOULD | |||
allow to honor and process the option, ignore the option, or drop | allow to honor and process the option, ignore the option, or drop | |||
packets containing this option. The default configuration is to | packets containing this option. The default configuration is to | |||
ignore the Quick Start option. | ignore the Quick-Start option. | |||
We note that if routers in a given environment do not implement | We note that if routers in a given environment do not implement | |||
and enable the Quick-Start mechanism, only the general security | and enable the Quick-Start mechanism, only the general security | |||
implications of IP options (discussed in Section 3) would apply. | implications of IP options (discussed in Section 3) would apply. | |||
4.22. RFC3692-style Experiment (Types = 30, 94, 158, and 222) | 4.22. RFC3692-Style Experiment (Types = 30, 94, 158, and 222) | |||
Section 2.5 of RFC 4727 [RFC4727] allocates an option number with all | Section 2.5 of RFC 4727 [RFC4727] allocates an option number with all | |||
defined values of the "copy" and "class" fields for RFC3692-style | defined values of the "copy" and "class" fields for RFC3692-style | |||
experiments. This results in four distinct option type codes: 30, | experiments. This results in four distinct option type codes: 30, | |||
94, 158, and 222. | 94, 158, and 222. | |||
4.22.1. Uses | 4.22.1. Uses | |||
It is only appropriate to use these values in explicitly configured | It is only appropriate to use these values in explicitly configured | |||
experiments; they MUST NOT be shipped as defaults in implementations. | experiments; they MUST NOT be shipped as defaults in implementations. | |||
skipping to change at page 28, line 38 | skipping to change at page 28, line 38 | |||
No specific security issues are known for this IPv4 option. | No specific security issues are known for this IPv4 option. | |||
4.22.4. Operational and Interoperability Impact if Blocked | 4.22.4. Operational and Interoperability Impact if Blocked | |||
None. | None. | |||
4.22.5. Advice | 4.22.5. Advice | |||
Routers, security gateways, and firewalls SHOULD have configuration | Routers, security gateways, and firewalls SHOULD have configuration | |||
knobs for IP packets that contain RFC3692-style Experiment options to | knobs for IP packets that contain RFC3692-style Experiment options to | |||
select between "ignore & forward" and "drop & log"). Otherwise, no | select between "ignore & forward" and "drop & log". Otherwise, no | |||
legitimate experiment using these options will be able to traverse | legitimate experiment using these options will be able to traverse | |||
any IP router. | any IP router. | |||
Special care needs to be taken in the case of "drop & log". Devices | Special care needs to be taken in the case of "drop & log". Devices | |||
SHOULD count the number of packets dropped, but the logging of drop | SHOULD count the number of packets dropped, but the logging of drop | |||
events SHOULD be limited to not overburden device resources. | events SHOULD be limited so as to not overburden device resources. | |||
The aforementioned configuration knob SHOULD default to "drop & log". | The aforementioned configuration knob SHOULD default to "drop & log". | |||
4.23. Other IP Options | 4.23. Other IP Options | |||
4.23.1. Specification | 4.23.1. Specification | |||
Unrecognized IP Options are to be ignored. Section 3.2.1.8 of RFC | Unrecognized IP options are to be ignored. Section 3.2.1.8 of RFC | |||
1122 [RFC1122] and Section 4.2.2.6 of RFC 1812 [RFC1812] specify this | 1122 [RFC1122] specifies this behavior as follows: | |||
behavior as follows: | ||||
RFC 1122: "The IP and transport layer MUST each interpret those IP | The IP and transport layer MUST each interpret those IP options | |||
options that they understand and silently ignore the | that they understand and silently ignore the others. | |||
others." | ||||
RFC 1812: "A router MUST ignore IP options which it does not | Additionally, Section 4.2.2.6 of RFC 1812 [RFC1812] specifies it as | |||
recognize." | follows: | |||
This document adds that unrecognized IP Options MAY also be logged. | A router MUST ignore IP options which it does not recognize. | |||
This document adds that unrecognized IP options MAY also be logged. | ||||
Further, routers, security gateways, and firewalls MUST provide the | Further, routers, security gateways, and firewalls MUST provide the | |||
ability to log drop events of IP packets containing unrecognized or | ability to log drop events of IP packets containing unrecognized or | |||
obsolete options. | obsolete options. | |||
A number of additional options are listed in the "IP OPTIONS NUMBERS" | A number of additional options are listed in the "IP OPTION NUMBERS" | |||
IANA registry [IANA-IP] as of the time this document was last edited. | IANA registry [IANA-IP] as of the time this document was last edited. | |||
Specifically: | Specifically: | |||
Copy Class Number Value Name | Copy Class Number Value Name | |||
---- ----- ------ ----- ------------------------------------------- | ---- ----- ------ ----- ------------------------------------------- | |||
0 0 10 10 ZSU - Experimental Measurement | 0 0 10 10 ZSU - Experimental Measurement | |||
1 2 13 205 FINN - Experimental Flow Control | 1 2 13 205 FINN - Experimental Flow Control | |||
0 0 15 15 ENCODE - ??? | 0 0 15 15 ENCODE - ??? | |||
1 0 16 144 IMITD - IMI Traffic Descriptor | 1 0 16 144 IMITD - IMI Traffic Descriptor | |||
1 0 22 150 - Unassigned (Released 18 Oct. 2005) | 1 0 22 150 - Unassigned (Released 18 Oct. 2005) | |||
skipping to change at page 30, line 4 | skipping to change at page 30, line 9 | |||
4.23.3. Operational and Interoperability Impact if Blocked | 4.23.3. Operational and Interoperability Impact if Blocked | |||
The lack of open specifications for these options makes it impossible | The lack of open specifications for these options makes it impossible | |||
to evaluate the operational and interoperability impact if packets | to evaluate the operational and interoperability impact if packets | |||
containing these options are blocked. | containing these options are blocked. | |||
4.23.4. Advice | 4.23.4. Advice | |||
Routers, security gateways, and firewalls SHOULD have configuration | Routers, security gateways, and firewalls SHOULD have configuration | |||
knobs for IP packets containing these options (or other options not | knobs for IP packets containing these options (or other options not | |||
recognized) to select between "ignore & forward" and "drop & log"). | recognized) to select between "ignore & forward" and "drop & log". | |||
Section 4.23.1 points out that [RFC1122] and [RFC1812] specify that | Section 4.23.1 points out that [RFC1122] and [RFC1812] specify that | |||
unrecognized IP options MUST be ignored. However, the previous | unrecognized IP options MUST be ignored. However, the previous | |||
paragraph states that routers, security gateways, and firewalls | paragraph states that routers, security gateways, and firewalls | |||
SHOULD have a configuration option for dropping and logging IP | SHOULD have a configuration option for dropping and logging IP | |||
packets containing unrecognized options. While is is acknowledged | packets containing unrecognized options. While it is acknowledged | |||
that this advice contradicts the previous RFC requirements, the | that this advice contradicts the previous RFCs' requirements, the | |||
advice in this document reflects current operational reality. | advice in this document reflects current operational reality. | |||
Special care needs to be taken in the case of "drop & log". Devices | Special care needs to be taken in the case of "drop & log". Devices | |||
SHOULD count the number of packets dropped, but the logging of drop | SHOULD count the number of packets dropped, but the logging of drop | |||
events SHOULD be limited to not overburden device resources. | events SHOULD be limited so as to not overburden device resources. | |||
5. IANA Considerations | ||||
This document has no actions for IANA. | ||||
6. Security Considerations | 5. Security Considerations | |||
This document provides advice on the filtering of IP packets that | This document provides advice on the filtering of IP packets that | |||
contain IP options. Dropping such packets can help to mitigate the | contain IP options. Dropping such packets can help to mitigate the | |||
security issues that arise from use of different IP options. Many of | security issues that arise from use of different IP options. Many of | |||
the IPv4 options listed in this document are deprecated and cause no | the IPv4 options listed in this document are deprecated and cause no | |||
operational impact if dropped. However, dropping packets containing | operational impact if dropped. However, dropping packets containing | |||
IPv4 options that are in use can cause real operational problems in | IPv4 options that are in use can cause real operational problems in | |||
deployed networks. Therefore, the practice of dropping all IPv4 | deployed networks. Therefore, the practice of dropping all IPv4 | |||
packets containing one or more IPv4 options without careful | packets containing one or more IPv4 options without careful | |||
consideration is not recommended. | consideration is not recommended. | |||
7. Acknowledgements | 6. Acknowledgements | |||
The authors would like to thank (in alphabetical order) Ron Bonica, | The authors would like to thank (in alphabetical order) Ron Bonica, | |||
C. M. Heard, Merike Kaeo, Panos Kampanakis, Suresh Krishnan, Arturo | C. M. Heard, Merike Kaeo, Panos Kampanakis, Suresh Krishnan, Arturo | |||
Servin, SM, and Donald Smith for providing thorough reviews and | Servin, SM, and Donald Smith for providing thorough reviews and | |||
valuable comments. Merike Kaeo also contributed text used in this | valuable comments. Merike Kaeo also contributed text used in this | |||
document. | document. | |||
The authors also wish to thank various network operations folks who | The authors also wish to thank various network operations folks who | |||
supplied feedback on earlier versions of this document, but did not | supplied feedback on earlier versions of this document but did not | |||
wish to be named explicitly in this document. | wish to be named explicitly in this document. | |||
Part of this document is initially based on the document "Security | Part of this document is initially based on the document "Security | |||
Assessment of the Internet Protocol" [CPNI2008] that is the result of | Assessment of the Internet Protocol" [CPNI2008] that is the result of | |||
a project carried out by Fernando Gont on behalf of UK CPNI (formerly | a project carried out by Fernando Gont on behalf of UK CPNI (formerly | |||
NISCC). Fernando Gont would like to thank UK CPNI (formerly NISCC) | NISCC). Fernando Gont would like to thank UK CPNI (formerly NISCC) | |||
for their continued support. | for their continued support. | |||
8. References | 7. References | |||
8.1. Normative References | 7.1. Normative References | |||
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, September | |||
September 1981. | 1981. | |||
[RFC1122] Braden, R., "Requirements for Internet Hosts - | [RFC1122] Braden, R., "Requirements for Internet Hosts - | |||
Communication Layers", STD 3, RFC 1122, October 1989. | Communication Layers", STD 3, RFC 1122, October 1989. | |||
[RFC1191] Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191, | [RFC1191] Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191, | |||
November 1990. | November 1990. | |||
[RFC1812] Baker, F., "Requirements for IP Version 4 Routers", | [RFC1812] Baker, F., "Requirements for IP Version 4 Routers", RFC | |||
RFC 1812, June 1995. | 1812, June 1995. | |||
[RFC2113] Katz, D., "IP Router Alert Option", RFC 2113, | [RFC2113] Katz, D., "IP Router Alert Option", RFC 2113, February | |||
February 1997. | 1997. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
[RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4, | [RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4, | |||
ICMPv6, UDP, and TCP Headers", RFC 4727, November 2006. | ICMPv6, UDP, and TCP Headers", RFC 4727, November 2006. | |||
[RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU | [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU | |||
Discovery", RFC 4821, March 2007. | Discovery", RFC 4821, March 2007. | |||
[RFC5015] Handley, M., Kouvelas, I., Speakman, T., and L. Vicisano, | [RFC5015] Handley, M., Kouvelas, I., Speakman, T., and L. Vicisano, | |||
"Bidirectional Protocol Independent Multicast (BIDIR- | "Bidirectional Protocol Independent Multicast (BIDIR- | |||
PIM)", RFC 5015, October 2007. | PIM)", RFC 5015, October 2007. | |||
[RFC6398] Le Faucheur, F., "IP Router Alert Considerations and | [RFC6398] Le Faucheur, F., "IP Router Alert Considerations and | |||
Usage", BCP 168, RFC 6398, October 2011. | Usage", BCP 168, RFC 6398, October 2011. | |||
[RFC6814] Pignataro, C. and F. Gont, "Formally Deprecating Some IPv4 | [RFC6814] Pignataro, C. and F. Gont, "Formally Deprecating Some IPv4 | |||
Options", RFC 6814, November 2012. | Options", RFC 6814, November 2012. | |||
8.2. Informative References | 7.2. Informative References | |||
[BIDIR-TREES] | ||||
Estrin, D. and D. Farinacci, "Bi-Directional Shared Trees | ||||
in PIM-SM", Work in Progress, May 1999. | ||||
[BREMIER-BARR] | [BREMIER-BARR] | |||
Bremier-Barr, A. and H. Levy, "Spoofing prevention | Bremier-Barr, A. and H. Levy, "Spoofing prevention | |||
method", Proceedings of IEEE InfoCom 2005 Volume 1, pp. | method", Proceedings of IEEE InfoCom 2005, Volume 1, pp. | |||
536-547, IEEE, March 2005. | 536-547, March 2005. | |||
[Biondi2007] | [Biondi2007] | |||
Biondi, P. and A. Ebalard, "IPv6 Routing Header Security", | Biondi, P. and A. Ebalard, "IPv6 Routing Header Security", | |||
CanSecWest 2007 Security Conference <http:// | CanSecWest 2007 Security Conference, 2007, | |||
www.secdev.org/conf/IPv6_RH_security-csw07.pdf>, 2007. | <http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf>. | |||
[CIPSOWG1994] | [CIPSOWG1994] | |||
CIPSOWG, "Commercial Internet Protocol Security Option | IETF CIPSO Working Group, "Commercial Internet Protocol | |||
(CIPSO) Working Group", 1994, <http://www.ietf.org/ | Security Option (CIPSO) Charter", 1994, | |||
proceedings/94jul/charters/cipso-charter.html>. | <http://www.ietf.org/proceedings/94jul/charters/ | |||
cipso-charter.html>. | ||||
[CIPSO] IETF CIPSO Working Group, "COMMERCIAL IP SECURITY OPTION | ||||
(CIPSO 2.2)", Work in Progress, 1992. | ||||
[CPNI2008] | [CPNI2008] | |||
Gont, F., "Security Assessment of the Internet Protocol", | Gont, F., "Security Assessment of the Internet Protocol", | |||
<http://www.cpni.gov.uk/Docs/InternetProtocol.pdf>, 2008. | 2008, | |||
<http://www.gont.com.ar/papers/InternetProtocol.pdf>. | ||||
[Cisco-IPSO-Cmds] | ||||
Cisco Systems, Inc., "IP Security Options Commands", Cisco | ||||
IOS Security Command Reference, Release 12.2, | ||||
<http://www.cisco.com/en/US/docs/ios/12_2/security/command | ||||
/reference/srfipso.html>. | ||||
[Cisco-IPSO] | [Cisco-IPSO] | |||
Cisco Systems, Inc., "Cisco IOS Security Configuration | Cisco Systems, Inc., "Configuring IP Security Options", | |||
Guide, Release 12.2 - Configuring IP Security Options", | Cisco IOS Security Configuration Guide, Release 12.2, | |||
2006, <http://www.cisco.com/en/US/docs/ios/12_2/security/ | 2006, <http://www.cisco.com/en/US/docs/ios/12_2/security/ | |||
configuration/guide/scfipso.html>. | configuration/guide/scfipso.html>. | |||
[Cisco-IPSO-Cmds] | [DIFFSERV-DPS] | |||
Cisco Systems, Inc., "Cisco IOS Security Command | Stoica, I., Zhang, H., Venkitaram, N., and J. Mysore, "Per | |||
Reference, Release 12.2 - IP Security Options Commands", | Hop Behaviors Based on Dynamic Packet State", Work in | |||
<http://www.cisco.com/en/US/docs/ios/12_2/security/ | Progress, October 2002. | |||
command/reference/srfipso.html>. | ||||
[FIPS1994] | [FIPS1994] | |||
FIPS, "Standard Security Label for Information Transfer", | FIPS, "Standard Security Label for Information Transfer", | |||
Federal Information Processing Standards Publication. FIP | Federal Information Processing Standards Publication, FIP | |||
PUBS 188, <http://csrc.nist.gov/publications/fips/fips188/ | PUBS 188, 1994, <http://csrc.nist.gov/publications/fips/ | |||
fips188.pdf>, 1994. | fips188/fips188.pdf>. | |||
[FONSECA] Fonseca, R., Porter, G., Katz, R., Shenker, S., and I. | [FONSECA] Fonseca, R., Porter, G., Katz, R., Shenker, S., and I. | |||
Stoica, "IP Options are not an option", December 2005. | Stoica, "IP Options are not an option", EECS Department, | |||
University of California, Berkeley, December 2005, | ||||
[I-D.farinacci-bidir-pim] | <http://www.eecs.berkeley.edu/Pubs/TechRpts/2005/ | |||
Estrin, D. and D. Farinacci, "Bi-Directional Shared Trees | EECS-2005-24.html>. | |||
in PIM-SM", draft-farinacci-bidir-pim (work in progress), | ||||
May 1999. | ||||
[I-D.ietf-cipso-ipsecurity] | ||||
IETF CIPSO Working Group, "COMMERCIAL IP SECURITY OPTION | ||||
(CIPSO 2.2)", draft-ietf-cipso-ipsecurity-01 (work in | ||||
progress), 1992. | ||||
[I-D.stoica-diffserv-dps] | ||||
Stoica, I., Zhang, H., Baker, F., and Y. Bernet, "Per Hop | ||||
Behaviors Based on Dynamic Packet State", | ||||
draft-stoica-diffserv-dps-02 (work in progress), | ||||
October 2002. | ||||
[IANA-IP] Internet Assigned Numbers Authority, "IP OPTION NUMBERS", | [IANA-IP] IANA, "IP OPTION NUMBERS", | |||
April 2011, | ||||
<http://www.iana.org/assignments/ip-parameters>. | <http://www.iana.org/assignments/ip-parameters>. | |||
[IRIX2008] | [IRIX2008] | |||
IRIX, "IRIX 6.5 trusted_networking(7) manual page", 2008, | IRIX, "IRIX 6.5 trusted_networking(7) manual page", 2008, | |||
<http://techpubs.sgi.com/library/tpl/cgi-bin/ | <http://techpubs.sgi.com/library/tpl/cgi-bin/ | |||
getdoc.cgi?coll=0650&db=man&fname=/usr/share/catman/a_man/ | getdoc.cgi?coll=0650&db=man&fname=/usr/share/catman/a_man/ | |||
cat7/trusted_networking.z>. | cat7/trusted_networking.z>. | |||
[Kohno2005] | [Kohno2005] | |||
Kohno, T., Broido, A., and kc. Claffy, "Remote Physical | Kohno, T., Broido, A., and kc. Claffy, "Remote Physical | |||
Device Fingerprinting", IEEE Transactions on Dependable | Device Fingerprinting", IEEE Transactions on Dependable | |||
and Secure Computing Vol. 2, No. 2, 2005. | and Secure Computing, Vol. 2, No. 2, 2005. | |||
[Landwehr81] | [Landwehr81] | |||
Landwehr, C., "Formal Models for Computer Security", ACM | Landwehr, C., "Formal Models for Computer Security", ACM | |||
Computing Surveys Vol 13, No 3, September 1981, Assoc for | Computing Surveys, Vol. 13, No. 3, Association for | |||
Computing Machinery, New York, NY, USA, 1981. | Computing Machinery, New York, NY, USA, September 1981. | |||
[MEDINA] Medina, A., Allman, M., and S. Floyd, "Measuring | [MEDINA] Medina, A., Allman, M., and S. Floyd, "Measuring | |||
Interactions Between Transport Protocols and Middleboxes", | Interactions Between Transport Protocols and Middleboxes", | |||
Proc. 4th ACM SIGCOMM/USENIX Conference on | Proc. 4th ACM SIGCOMM/USENIX Conference on Internet | |||
Internet Measurement, October 2004. | Measurement, October 2004. | |||
[Microsoft1999] | [Microsoft1999] | |||
Microsoft, "Microsoft Security Program: Microsoft Security | Microsoft, "Microsoft Security Program: Microsoft Security | |||
Bulletin (MS99-038). Patch Available for "Spoofed Route | Bulletin (MS99-038). Patch Available for "Spoofed Route | |||
Pointer" Vulnerability", 1999, <http://www.microsoft.com/ | Pointer" Vulnerability", September 1999, | |||
technet/security/bulletin/ms99-038.mspx>. | <http://www.microsoft.com/technet/security/bulletin/ | |||
ms99-038.mspx>. | ||||
[OpenBSD1998] | [OpenBSD1998] | |||
OpenBSD, "OpenBSD Security Advisory: IP Source Routing | OpenBSD, "OpenBSD Security Advisory: IP Source Routing | |||
Problem", 1998, | Problem", February 1998, | |||
<http://www.openbsd.org/advisories/sourceroute.txt>. | <http://www.openbsd.org/advisories/sourceroute.txt>. | |||
[RFC1038] St. Johns, M., "Draft revised IP security option", | [RFC1038] St. Johns, M., "Draft revised IP security option", RFC | |||
RFC 1038, January 1988. | 1038, January 1988. | |||
[RFC1063] Mogul, J., Kent, C., Partridge, C., and K. McCloghrie, "IP | [RFC1063] Mogul, J., Kent, C., Partridge, C., and K. McCloghrie, "IP | |||
MTU discovery options", RFC 1063, July 1988. | MTU discovery options", RFC 1063, July 1988. | |||
[RFC1108] Kent, S., "U.S", RFC 1108, November 1991. | [RFC1108] Kent, S., "U.S. Department of Defense Security Options for | |||
the Internet Protocol", RFC 1108, November 1991. | ||||
[RFC1385] Wang, Z., "EIP: The Extended Internet Protocol", RFC 1385, | [RFC1385] Wang, Z., "EIP: The Extended Internet Protocol", RFC 1385, | |||
November 1992. | November 1992. | |||
[RFC1393] Malkin, G., "Traceroute Using an IP Option", RFC 1393, | [RFC1393] Malkin, G., "Traceroute Using an IP Option", RFC 1393, | |||
January 1993. | January 1993. | |||
[RFC1475] Ullmann, R., "TP/IX: The Next Internet", RFC 1475, | [RFC1475] Ullmann, R., "TP/IX: The Next Internet", RFC 1475, June | |||
June 1993. | 1993. | |||
[RFC1770] Graff, C., "IPv4 Option for Sender Directed Multi- | [RFC1770] Graff, C., "IPv4 Option for Sender Directed Multi- | |||
Destination Delivery", RFC 1770, March 1995. | Destination Delivery", RFC 1770, March 1995. | |||
[RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S. | [RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S. | |||
Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 | Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 | |||
Functional Specification", RFC 2205, September 1997. | Functional Specification", RFC 2205, September 1997. | |||
[RFC2407] Piper, D., "The Internet IP Security Domain of | [RFC2407] Piper, D., "The Internet IP Security Domain of | |||
Interpretation for ISAKMP", RFC 2407, November 1998. | Interpretation for ISAKMP", RFC 2407, November 1998. | |||
[RFC3585] Jason, J., Rafalow, L., and E. Vyncke, "IPsec | [RFC3585] Jason, J., Rafalow, L., and E. Vyncke, "IPsec | |||
Configuration Policy Information Model", RFC 3585, | Configuration Policy Information Model", RFC 3585, August | |||
August 2003. | 2003. | |||
[RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC | ||||
4306, December 2005. | ||||
[RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick- | [RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick- | |||
Start for TCP and IP", RFC 4782, January 2007. | Start for TCP and IP", RFC 4782, January 2007. | |||
[RFC4807] Baer, M., Charlet, R., Hardaker, W., Story, R., and C. | [RFC4807] Baer, M., Charlet, R., Hardaker, W., Story, R., and C. | |||
Wang, "IPsec Security Policy Database Configuration MIB", | Wang, "IPsec Security Policy Database Configuration MIB", | |||
RFC 4807, March 2007. | RFC 4807, March 2007. | |||
[RFC4949] Shirey, R., "Internet Security Glossary, Version 2", | [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", RFC | |||
RFC 4949, August 2007. | 4949, August 2007. | |||
[RFC5350] Manner, J. and A. McDonald, "IANA Considerations for the | [RFC5350] Manner, J. and A. McDonald, "IANA Considerations for the | |||
IPv4 and IPv6 Router Alert Options", RFC 5350, | IPv4 and IPv6 Router Alert Options", RFC 5350, September | |||
September 2008. | 2008. | |||
[RFC5570] StJohns, M., Atkinson, R., and G. Thomas, "Common | [RFC5570] StJohns, M., Atkinson, R., and G. Thomas, "Common | |||
Architecture Label IPv6 Security Option (CALIPSO)", | Architecture Label IPv6 Security Option (CALIPSO)", RFC | |||
RFC 5570, July 2009. | 5570, July 2009. | |||
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen, | ||||
"Internet Key Exchange Protocol Version 2 (IKEv2)", RFC | ||||
5996, September 2010. | ||||
[RFC6192] Dugal, D., Pignataro, C., and R. Dunn, "Protecting the | [RFC6192] Dugal, D., Pignataro, C., and R. Dunn, "Protecting the | |||
Router Control Plane", RFC 6192, March 2011. | Router Control Plane", RFC 6192, March 2011. | |||
[RFC6274] Gont, F., "Security Assessment of the Internet Protocol | [RFC6274] Gont, F., "Security Assessment of the Internet Protocol | |||
Version 4", RFC 6274, July 2011. | Version 4", RFC 6274, July 2011. | |||
[SELinux2008] | [SELinux2008] | |||
National Security Agency, "Security-Enhanced Linux - NSA/ | National Security Agency (United States), "Security- | |||
CSS", January 2009, | Enhanced Linux - NSA/CSS", January 2009, | |||
<http://www.nsa.gov/research/selinux/index.shtml>. | <http://www.nsa.gov/research/selinux/index.shtml>. | |||
[Solaris2008] | [Solaris2008] | |||
"Solaris Trusted Extensions - Labeled Security for | "Solaris Trusted Extensions: Labeled Security for Absolute | |||
Absolute Protection", 2008, <http://www.sun.com/software/ | Protection", 2008, <http://www.oracle.com/technetwork/ | |||
solaris/ds/trusted_extensions.jsp#3>. | server-storage/solaris10/overview/ | |||
trusted-extensions-149944.pdf>. | ||||
Authors' Addresses | Authors' Addresses | |||
Fernando Gont | Fernando Gont | |||
UTN-FRH / SI6 Networks | UTN-FRH / SI6 Networks | |||
Evaristo Carriego 2644 | Evaristo Carriego 2644 | |||
Haedo, Provincia de Buenos Aires 1706 | Haedo, Provincia de Buenos Aires 1706 | |||
Argentina | Argentina | |||
Phone: +54 11 4650 8472 | Phone: +54 11 4650 8472 | |||
Email: fgont@si6networks.com | EMail: fgont@si6networks.com | |||
URI: http://www.si6networks.com | URI: http://www.si6networks.com | |||
RJ Atkinson | RJ Atkinson | |||
Consultant | Consultant | |||
McLean, VA 22103 | McLean, VA 22103 | |||
USA | USA | |||
Email: rja.lists@gmail.com | EMail: rja.lists@gmail.com | |||
Carlos Pignataro | Carlos Pignataro | |||
Cisco Systems, Inc. | Cisco Systems, Inc. | |||
7200-12 Kit Creek Road | 7200-12 Kit Creek Road | |||
Research Triangle Park, NC 27709 | Research Triangle Park, NC 27709 | |||
US | US | |||
Email: cpignata@cisco.com | EMail: cpignata@cisco.com | |||
End of changes. 143 change blocks. | ||||
362 lines changed or deleted | 369 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |