summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2521.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2521.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2521.txt')
-rw-r--r--doc/rfc/rfc2521.txt508
1 files changed, 508 insertions, 0 deletions
diff --git a/doc/rfc/rfc2521.txt b/doc/rfc/rfc2521.txt
new file mode 100644
index 0000000..34b5805
--- /dev/null
+++ b/doc/rfc/rfc2521.txt
@@ -0,0 +1,508 @@
+
+
+
+
+
+
+Network Working Group P. Karn
+Request for Comments: 2521 Qualcomm
+Category: Experimental W. Simpson
+ DayDreamer
+ March 1999
+
+
+ ICMP Security Failures Messages
+
+
+Status of this Memo
+
+ This document defines an Experimental Protocol for the Internet
+ community. It does not specify an Internet standard of any kind.
+ Discussion and suggestions for improvement are requested.
+ Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1999). Copyright (C) Philip Karn
+ and William Allen Simpson (1994-1999). All Rights Reserved.
+
+Abstract
+
+ This document specifies ICMP messages for indicating failures when
+ using IP Security Protocols (AH and ESP).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page i]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+Table of Contents
+
+
+ 1. Introduction .......................................... 1
+
+ 2. Message Formats ....................................... 1
+ 2.1 Bad SPI ......................................... 2
+ 2.2 Authentication Failed ........................... 2
+ 2.3 Decompression Failed ............................ 2
+ 2.4 Decryption Failed ............................... 2
+ 2.5 Need Authentication ............................. 3
+ 2.6 Need Authorization .............................. 3
+
+ 3. Error Procedures ...................................... 3
+
+ SECURITY CONSIDERATIONS ...................................... 4
+
+ HISTORY ...................................................... 5
+
+ ACKNOWLEDGEMENTS ............................................. 5
+
+ REFERENCES ................................................... 5
+
+ CONTACTS ..................................................... 6
+
+ COPYRIGHT .................................................... 7
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page ii]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+1. Introduction
+
+ This mechanism is intended for use with the Internet Security
+ Protocols [RFC-1825 et sequitur] for authentication and privacy. For
+ statically configured Security Associations, these messages indicate
+ that the operator needs to manually reconfigure, or is attempting an
+ unauthorized operation. These messages may also be used to trigger
+ automated session-key management.
+
+ The datagram format and basic facilities are already defined for ICMP
+ [RFC-792].
+
+ Up-to-date values of the ICMP Type field are specified in the most
+ recent "Assigned Numbers" [RFC-1700]. This document concerns the
+ following values:
+
+ 40 Security Failures
+
+
+
+2. Message Formats
+
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Code | Checksum |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Reserved | Pointer |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ ~ Original Internet Headers + 64 bits of Payload ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type 40
+
+ Code Indicates the kind of failure:
+
+ 0 = Bad SPI
+ 1 = Authentication Failed
+ 2 = Decompression Failed
+ 3 = Decryption Failed
+ 4 = Need Authentication
+ 5 = Need Authorization
+
+
+ Checksum Two octets. The ICMP Checksum.
+
+ Reserved Two octets. For future use; MUST be set to zero
+
+
+
+Karn & Simpson Experimental [Page 1]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+ when transmitted, and MUST be ignored when received.
+
+ Pointer Two octets. An offset into the Original Internet
+ Headers that locates the most significant octet of
+ the offending SPI. Will be zero when no SPI is
+ present.
+
+ Original Internet Headers ...
+ The original Internet Protocol header, any
+ intervening headers up to and including the
+ offending SPI (if any), plus the first 64 bits (8
+ octets) of the remaining payload data.
+
+ This data is used by the host to match the message
+ to the appropriate process. If a payload protocol
+ uses port numbers, they are assumed to be in the
+ first 64-bits of the original datagram's payload.
+
+ Usage of this message is elaborated in the following sections.
+
+
+2.1. Bad SPI
+
+ Indicates that a received datagram includes a Security Parameters
+ Index (SPI) that is invalid or has expired.
+
+
+2.2. Authentication Failed
+
+ Indicates that a received datagram failed the authenticity or
+ integrity check for a given SPI.
+
+ Note that the SPI may indicate an outer Encapsulating Security
+ Protocol when a separate Authentication Header SPI is hidden inside.
+
+
+2.3. Decompression Failed
+
+ Indicates that a received datagram failed a decompression check for a
+ given SPI.
+
+
+2.4. Decryption Failed
+
+ Indicates that a received datagram failed a decryption check for a
+ given SPI.
+
+
+
+
+
+Karn & Simpson Experimental [Page 2]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+2.5. Need Authentication
+
+ Indicates that a received datagram will not be accepted without
+ additional authentication.
+
+ In this case, either no SPI is present, or an unsuitable SPI is
+ present. For example, an encryption SPI without integrity arrives
+ from a secure operating system with mutually suspicious users.
+
+
+2.6. Need Authorization
+
+ Indicates that a received datagram will not be accepted because it
+ has insufficient authorization.
+
+ In this case, an authentication SPI is present that is inappropriate
+ for the target transport or application. The principle party denoted
+ by the SPI does not have proper authorization for the facilities used
+ by the datagram. For example, the party is authorized for Telnet
+ access, but not for FTP access.
+
+
+3. Error Procedures
+
+ As is usual with ICMP messages, upon receipt of one of these error
+ messages that is uninterpretable or otherwise contains an error, no
+ ICMP error message is sent in response. Instead, the message is
+ silently discarded. However, for diagnosis of problems, a node
+ SHOULD provide the capability of logging the error, including the
+ contents of the silently discarded datagram, and SHOULD record the
+ event in a statistics counter.
+
+ On receipt, special care MUST be taken that the ICMP message actually
+ includes information that matches a previously sent IP datagram.
+ Otherwise, this might provide an opportunity for a denial of service
+ attack.
+
+ The sending implementation MUST be able to limit the rate at which
+ these messages are generated. The rate limit parameters SHOULD be
+ configurable. How the limits are applied (such as, by destination or
+ per interface) is left to the implementor's discretion.
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page 3]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+Security Considerations
+
+ When a prior Security Association between the parties has not
+ expired, these messages SHOULD be sent with authentication.
+
+ However, the node MUST NOT dynamically establish a new Security
+ Association for the sole purpose of authenticating these messages.
+ Automated key management is computationally intensive. This could be
+ used for a very serious denial of service attack. It would be very
+ easy to swamp a target with bogus SPIs from random IP Sources, and
+ have it start up numerous useless key management sessions to
+ authentically inform the putative sender.
+
+ In the event of loss of state (such as a system crash), the node will
+ need to send failure messages to all parties that attempt subsequent
+ communication. In this case, the node may have lost the key
+ management technique that was used to establish the Security
+ Association.
+
+ Much better to simply let the peers know that there was a failure,
+ and let them request key management as needed (at their staggered
+ timeouts). They'll remember the previous key management technique,
+ and restart gracefully. This distributes the restart burden among
+ systems, and helps allow the recently failed node to manage its
+ computational resources.
+
+ In addition, these messages inform the recipient when the ICMP sender
+ is under attack. Unlike other ICMP error messages, the messages
+ provide sufficient data to determine that these messages are in
+ response to previously sent messages.
+
+ Therefore, it is imperative that the recipient accept both
+ authenticated and unauthenticated failure messages. The recipient's
+ log SHOULD indicate when the ICMP messages are not validated, and
+ when the ICMP messages are not in response to a valid previous
+ message.
+
+ There is some concern that sending these messages may result in the
+ leak of security information. For example, an attacker might use
+ these messages to test or verify potential forged keys. However,
+ this information is already available through the simple expedient of
+ using Echo facilities, or waiting for a TCP 3-way handshake.
+
+ The rate limiting mechanism also limits this form of leak, as many
+ messages will not result in an error indication. At the very least,
+ this will lengthen the time factor for verifying such information.
+
+
+
+
+
+Karn & Simpson Experimental [Page 4]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+History
+
+ The text has been extensively reviewed on the IP Security mailing
+ list, in January and February of 1995 and again in December 1995.
+ The specification is stable, and was forwarded to the IESG by the
+ authors for IETF Last Call as a Proposed Standard in March 1996.
+ There have been several implementations.
+
+
+Acknowledgements
+
+ Some of the text of this specification was derived from "Requirements
+ for Internet Hosts -- Communication Layers" [RFC-1122] and
+ "Requirements for IP Version 4 Routers" [RFC-1812].
+
+ Naganand Doraswamy and Hilarie Orman provided useful critiques of
+ earlier versions of this document.
+
+ Stimulating comments were also received from Jeffrey Schiller.
+
+ Special thanks to the Center for Information Technology Integration
+ (CITI) for providing computing resources.
+
+
+References
+
+ [RFC-792] Postel, J., "Internet Control Message Protocol", STD 5,
+ September 1981.
+
+ [RFC-1122] Braden, R., Editor, "Requirements for Internet Hosts --
+ Communication Layers", STD 3, USC/Information Sciences
+ Institute, October 1989.
+
+ [RFC-1700] Reynolds, J., and Postel, J., "Assigned Numbers", STD 2,
+ USC/Information Sciences Institute, October 1994.
+
+ [RFC-1812] Baker, F., Editor, "Requirements for IP Version 4
+ Routers", Cisco Systems, June 1995.
+
+ [RFC-1825] Atkinson, R., "Security Architecture for the Internet
+ Protocol", Naval Research Laboratory, July 1995.
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page 5]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+Contacts
+
+ Comments about this document should be discussed on the
+ photuris@adk.gr mailing list.
+
+ Questions about this document can also be directed to:
+
+ Phil Karn
+ Qualcomm, Inc.
+ 6455 Lusk Blvd.
+ San Diego, California 92121-2779
+
+ karn@qualcomm.com
+ karn@unix.ka9q.ampr.org (preferred)
+
+
+ William Allen Simpson
+ DayDreamer
+ Computer Systems Consulting Services
+ 1384 Fontaine
+ Madison Heights, Michigan 48071
+
+ wsimpson@UMich.edu
+ wsimpson@GreenDragon.com (preferred)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page 6]
+
+RFC 2521 ICMP Security Failures March 1999
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (1999). Copyright (C) Philip
+ Karn and William Allen Simpson (1994-1999). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain
+ it or assist in its implementation may be prepared, copied,
+ published and distributed, in whole or in part, without restriction
+ of any kind, provided that the above copyright notice and this
+ paragraph are included on all such copies and derivative works.
+ However, this document itself may not be modified in any way, such
+ as by removing the copyright notice or references to the Internet
+ Society or other Internet organizations, except as needed for the
+ purpose of developing Internet standards (in which case the
+ procedures for copyrights defined in the Internet Standards process
+ must be followed), or as required to translate it into languages
+ other than English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ (BUT NOT LIMITED TO) ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karn & Simpson Experimental [Page 7]
+