summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2267.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2267.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2267.txt')
-rw-r--r--doc/rfc/rfc2267.txt563
1 files changed, 563 insertions, 0 deletions
diff --git a/doc/rfc/rfc2267.txt b/doc/rfc/rfc2267.txt
new file mode 100644
index 0000000..585b4b3
--- /dev/null
+++ b/doc/rfc/rfc2267.txt
@@ -0,0 +1,563 @@
+
+
+
+
+
+
+Network Working Group P. Ferguson
+Request for Comments: 2267 Cisco Systems, Inc.
+Category: Informational D. Senie
+ BlazeNet, Inc.
+ January 1998
+
+
+ Network Ingress Filtering:
+ Defeating Denial of Service Attacks which employ
+ IP Source Address Spoofing
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+Abstract
+
+ Recent occurrences of various Denial of Service (DoS) attacks which
+ have employed forged source addresses have proven to be a troublesome
+ issue for Internet Service Providers and the Internet community
+ overall. This paper discusses a simple, effective, and
+ straightforward method for using ingress traffic filtering to
+ prohibit DoS attacks which use forged IP addresses to be propagated
+ from 'behind' an Internet Service Provider's (ISP) aggregation point.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Background . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 3. Restricting forged traffic . . . . . . . . . . . . . . . . 5
+ 4. Further capabilities for networking equipment. . . . . . . 6
+ 5. Liabilities. . . . . . . . . . . . . . . . . . . . . . . . 6
+ 6. Summary. . . . . . . . . . . . . . . . . . . . . . . . . . 7
+ 7. Security Considerations. . . . . . . . . . . . . . . . . . 7
+ 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . 8
+ 9. References . . . . . . . . . . . . . . . . . . . . . . . . 8
+ 10. Authors' Addresses . . . . . . . . . . . . . . . . . . . . 9
+ 11. Full Copyright Statement . . . . . . . . . . . . . . . . . 10
+
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 1]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+1. Introduction
+
+ A resurgence of Denial of Service Attacks [1] aimed at various
+ targets in the Internet have produced new challenges within the
+ Internet Service Provider (ISP) and network security communities to
+ find new and innovative methods to mitigate these types of attacks.
+ The difficulties in reaching this goal are numerous; some simple
+ tools already exist to limit the effectiveness and scope of these
+ attacks, but they have not been widely implemented.
+
+ This method of attack has been known for some time. Defending against
+ it, however, has been an ongoing concern. Bill Cheswick is quoted in
+ [2] as saying that he pulled a chapter from his book, "Firewalls and
+ Internet Security" [3], at the last minute because there was no way
+ for an administrator of the system under attack to effectively defend
+ the system. By mentioning the method, he was concerned about
+ encouraging it's use.
+
+ While the filtering method discussed in this document does
+ absolutely nothing to protect against flooding attacks which
+ originate from valid prefixes (IP addresses), it will prohibit an
+ attacker within the originating network from launching an attack of
+ this nature using forged source addresses that do not conform to
+ ingress filtering rules. All providers of Internet connectivity are
+ urged to implement filtering described in this document to prohibit
+ attackers from using forged source addresses which do not reside
+ within a range of legitimately advertised prefixes. In other words,
+ if an ISP is aggregating routing announcements for multiple
+ downstream networks, strict traffic filtering should be used to
+ prohibit traffic which claims to have originated from outside of
+ these aggregated announcements.
+
+ An additional benefit of implementing this type of filtering is that
+ it enables the originator to be easily traced to it's true source,
+ since the attacker would have to use a valid, and legitimately
+ reachable, source address.
+
+2. Background
+
+ A simplified diagram of the TCP SYN flooding problem is depicted
+ below:
+
+ 9.0.0.0/8
+ host <----- router <--- Internet <----- router <-- attacker
+
+ TCP/SYN
+ <---------------------------------------------
+ Source: 192.168.0.4/32
+
+
+
+Ferguson & Senie Informational [Page 2]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+ SYN/ACK
+ no route
+ TCP/SYN
+ <---------------------------------------------
+ Source: 10.0.0.13/32
+ SYN/ACK
+ no route
+ TCP/SYN
+ <---------------------------------------------
+ Source: 172.16.0.2/32
+ SYN/ACK
+ no route
+
+ [etc.]
+
+ Assume:
+
+ o The "host" is the targeted machine.
+
+ o The attacker resides within the "valid" prefix, 9.0.0.0/8.
+
+ o The attacker launches the attack using randomly changing source
+ addresses; in this example, the source addresses are depicted as
+ from within [4], which are not generally present in the global
+ Internet routing tables, and therefore, unreachable. However, any
+ unreachable prefix could be used to perpetrate this attack
+ method.
+
+ Also worthy of mention is a case wherein the source address is forged
+ to appear to have originated from within another legitimate network
+ which appears in the global routing table(s). For example, an
+ attacker using a valid network address could wreak havoc by making
+ the attack appear to come from an organization which did not, in
+ fact, originate the attack and was completely innocent. In such
+ cases, the administrator of a system under attack may be inclined to
+ filter all traffic coming from the apparent attack source. Adding
+ such a filter would then result in a denial of service to
+ legitimate, non-hostile end-systems. In this case, the administrator
+ of the system under attack unwittingly becomes an accomplice of the
+ attacker.
+
+ Further complicating matters, TCP SYN flood attacks will result in
+ SYN-ACK packets being sent to one or many hosts which have no
+ involvement in the attack, but which become secondary victims. This
+ allows the attacker to abuse two or more systems at once.
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 3]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+ Similar attacks have been attempted using UDP and ICMP flooding.
+ The former attack (UDP flooding) uses forged packets to try and
+ connect the chargen UDP service to the echo UDP service at another
+ site. Systems administrators should NEVER allow UDP packets destined
+ for system diagnostic ports from outside of their administrative
+ domain to reach their systems. The latter attack (ICMP flooding),
+ uses an insidious feature in IP subnet broadcast replication
+ mechanics. This attack relies on a router serving a large multi-
+ access broadcast network to frame an IP broadcast address (such as
+ one destined for 10.255.255.255) into a Layer 2 broadcast frame (for
+ ethernet, FF:FF:FF:FF:FF:FF). Ethernet NIC hardware (MAC-layer
+ hardware, specifically) will only listen to a select number of
+ addresses in normal operation. The one MAC address that all devices
+ share in common in normal operation is the media broadcast, or
+ FF:FF:FF:FF:FF:FF. In this case, a device will take the packet and
+ send an interrupt for processing. Thus, a flood of these broadcast
+ frames will consume all available resources on an end-system [9]. It
+ is perhaps prudent that system administrators should consider
+ ensuring that their border routers do not allow directed broadcast
+ packets to be forwarded through their routers as a default.
+
+ When an TCP SYN attack is launched using unreachable source address,
+ the target host attempts to reserve resources waiting for a
+ response. The attacker repeatedly changes the bogus source address
+ on each new packet sent, thus exhausting additional host resources.
+
+ Alternatively, if the attacker uses someone else's valid host
+ address as the source address, the system under attack will send a
+ large number of SYN/ACK packets to what it believes is the originator
+ of the connection establishment sequence. In this fashion, the
+ attacker does damage to two systems: the destination target system,
+ as well as the system which is actually using the spoofed address in
+ the global routing system.
+
+ The result of both attack methods is extremely degraded performance,
+ or worse, a system crash.
+
+ In response to this threat, most operating system vendors have
+ modified their software to allow the targeted servers to sustain
+ attacks with very high connection attempt rates. This is a welcome
+ and necessary part of the solution to the problem. Ingress filtering
+ will take time to be implemented pervasively and be fully effective,
+ but the extensions to the operating systems can be implemented
+ quickly. This combination should prove effective against source
+ address spoofing. See [1] for vendor and platform software upgrade
+ information.
+
+
+
+
+
+Ferguson & Senie Informational [Page 4]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+3. Restricting forged traffic
+
+ The problems encountered with this type of attack are numerous, and
+ involve shortcomings in host software implementations, routing
+ methodologies, and the TCP/IP protocols themselves. However, by
+ restricting transit traffic which originates from a downstream
+ network to known, and intentionally advertised, prefix(es), the
+ problem of source address spoofing can be virtually eliminated in
+ this attack scenario.
+
+ 11.0.0.0/8
+ /
+ router 1
+ /
+ /
+ / 9.0.0.0/8
+ ISP <----- ISP <---- ISP <--- ISP <-- router <-- attacker
+ A B C D 2
+ /
+ /
+ /
+ router 3
+ /
+ 12.0.0.0/8
+
+
+ In the example above, the attacker resides within 9.0.0.0/8, which is
+ provided Internet connectivity by ISP D. An input traffic filter on
+ the ingress (input) link of "router 2", which provides connectivity
+ to the attacker's network, restricts traffic to allow only traffic
+ originating from source addresses within the 9.0.0.0/8 prefix, and
+ prohibits an attacker from using "invalid" source addresses which
+ reside outside of this prefix range.
+
+ In other words, the ingress filter on "router 2" above would check:
+
+ IF packet's source address from within 9.0.0.0/8
+ THEN forward as appropriate
+
+ IF packet's source address is anything else
+ THEN deny packet
+
+ Network administrators should log information on packets which are
+ dropped. This then provides a basis for monitoring any suspicious
+ activity.
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 5]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+4. Further possible capabilities for networking equipment
+
+ Additional functions should be considered for future platform
+ implementations. The following one is worth noting:
+
+ o Implementation of automatic filtering on remote access servers.
+ In most cases, a user dialing into an access server is an
+ individual user on a single PC. The ONLY valid source IP address
+ for packets originating from that PC is the one assigned by the
+ ISP (whether statically or dynamically assigned). The remote
+ access server could check every packet on ingress to ensure the
+ user is not spoofing the source address on the packets which he
+ is originating. Obviously, provisions also need to be made for
+ cases where the customer legitimately is attaching a net or
+ subnet via a remote router, but this could certainly be
+ implemented as an optional parameter. We have received reports
+ that some vendors and some ISPs are already starting to
+ implement this capability.
+
+ We considered suggesting routers also validate the source IP address
+ of the sender as suggested in [8], but that methodology will not
+ operate well in the real networks out there today. The method
+ suggested is to look up source addresses to see that the return path
+ to that address would flow out the same interface as the packet
+ arrived upon. With the number of asymmetric routes in the Internet,
+ this would clearly be problematic.
+
+5. Liabilities
+
+ Filtering of this nature has the potential to break some types of
+ "special" services. It is in the best interest of the ISP offering
+ these types of special services, however, to consider alternate
+ methods of implementing these services to avoid being affected by
+ ingress traffic filtering.
+
+ Mobile IP, as defined in [6], is specifically affected by ingress
+ traffic filtering. As specified, traffic to the mobile node is
+ tunneled, but traffic from the mobile node is not tunneled. This
+ results in packets from the mobile node(s) which have source
+ addresses that do not match with the network where the station is
+ attached. The Mobile IP Working Group is addressing this problem by
+ specifying "reverse tunnels" in [7]. This work in progress provides
+ a method for the data transmitted from the mobile node to be tunneled
+ to the home agent before transmission to the Internet. There are
+ additional benefits to the reverse tunneling scheme, including better
+ handling of multicast traffic. Those implementing mobile IP systems
+ are encouraged to implement this method of reverse tunneling.
+
+
+
+
+Ferguson & Senie Informational [Page 6]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+ As mentioned previously, while ingress traffic filtering drastically
+ reduces the success of source address spoofing, it does not preclude
+ an attacker using a forged source address of another host within the
+ permitted prefix filter range. It does, however, ensure that when an
+ attack of this nature does indeed occur, a network administrator can
+ be sure that the attack is actually originating from within the known
+ prefixes that are being advertised. This simplifies tracking down the
+ culprit, and at worst, the administrator can block a range of source
+ addresses until the problem is resolved.
+
+ If ingress filtering is used in an environment where DHCP or BOOTP is
+ used, the network administrator would be well advised to ensure that
+ packets with a source address of 0.0.0.0 and a destination of
+ 255.255.255.255 are allowed to reach the relay agent in routers when
+ appropriate. The scope of directed broadcast replication should be
+ controlled, however, and not arbitrarily forwarded.
+
+6. Summary
+
+ Ingress traffic filtering at the periphery of Internet connected
+ networks will reduce the effectiveness of source address spoofing
+ denial of service attacks. Network service providers and
+ administrators have already begun implementing this type of filtering
+ on periphery routers, and it is recommended that all service
+ providers do so as soon as possible. In addition to aiding the
+ Internet community as a whole to defeat this attack method, it can
+ also assist service providers in locating the source of the attack if
+ service providers can categorically demonstrate that their network
+ already has ingress filtering in place on customer links.
+
+ Corporate network administrators should implement filtering to ensure
+ their corporate networks are not the source of such problems. Indeed,
+ filtering could be used within an organization to ensure users do not
+ cause problems by improperly attaching systems to the wrong networks.
+ The filtering could also, in practice, block a disgruntled employee
+ from anonymous attacks.
+
+ It is the responsibility of all network administrators to ensure they
+ do not become the unwitting source of an attack of this nature.
+
+7. Security Considerations
+
+ The primary intent of this document is to inherently increase
+ security practices and awareness for the Internet community as a
+ whole; as more Internet Providers and corporate network
+ administrators implement ingress filtering, the opportunity for an
+ attacker to use forged source addresses as an attack methodology will
+ significantly lessen. Tracking the source of an attack is simplified
+
+
+
+Ferguson & Senie Informational [Page 7]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+ when the source is more likely to be "valid." By reducing the number
+ and frequency of attacks in the Internet as a whole, there will be
+ more resources for tracking the attacks which ultimately do occur.
+
+8. Acknowledgments
+
+ The North American Network Operators Group (NANOG) [5] group as a
+ whole deserves special credit for openly discussing these issues and
+ actively seeking possible solutions. Also, thanks to Justin Newton
+ [Priori Networks] and Steve Bielagus [OpenROUTE Networks, Inc.] for
+ their comments and contributions.
+
+9. References
+
+ [1] CERT Advisory CA-96.21; TCP SYN Flooding and IP Spoofing
+ Attacks; September 24, 1996.
+
+ [2] B. Ziegler, "Hacker Tangles Panix Web Site", Wall Street
+ Journal, 12 September 1996.
+
+ [3] "Firewalls and Internet Security: Repelling the Wily Hacker";
+ William R. Cheswick and Steven M. Bellovin, Addison-Wesley
+ Publishing Company, 1994; ISBN 0-201-63357-4.
+
+ [4] Rekhter, Y., Moskowitz, R., Karrenberg, D., de Groot, G., and
+ E. Lear, "Address Allocation for Private Internets", RFC 1918,
+ February 1996.
+
+ [5] The North American Network Operators Group;
+ http://www.nanog.org.
+
+ [6] Perkins, C., "IP Mobility Support", RFC 2002, October 1996.
+
+ [7] Montenegro, G., "Reverse Tunneling Mobile IP",
+ Work in Progress.
+
+ [8] Baker, F., "Requirements for IP Version 4 Routers", RFC 1812,
+ June 1995.
+
+ [9] Thanks to: Craig Huegen;
+ See: http://www.quadrunner.com/~chuegen/smurf.txt.
+
+
+
+
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 8]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+10. Authors' Addresses
+
+ Paul Ferguson
+ cisco Systems, Inc.
+ 400 Herndon Parkway
+ Herndon, VA USA 20170
+
+ EMail: ferguson@cisco.com
+
+
+ Daniel Senie
+ BlazeNet, Inc.
+ 4 Mechanic Street
+ Natick, MA USA 01760
+
+ EMail: dts@senie.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 9]
+
+RFC 2267 Network Ingress Filtering January 1998
+
+
+11. Full Copyright Statement
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ferguson & Senie Informational [Page 10]
+