diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6045.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6045.txt')
-rw-r--r-- | doc/rfc/rfc6045.txt | 4203 |
1 files changed, 4203 insertions, 0 deletions
diff --git a/doc/rfc/rfc6045.txt b/doc/rfc/rfc6045.txt new file mode 100644 index 0000000..fa40aa5 --- /dev/null +++ b/doc/rfc/rfc6045.txt @@ -0,0 +1,4203 @@ + + + + + + +Internet Engineering Task Force (IETF) K. Moriarty +Request for Comments: 6045 EMC +Category: Informational November 2010 +ISSN: 2070-1721 + + + Real-time Inter-network Defense (RID) + +Abstract + + Network security incidents, such as system compromises, worms, + viruses, phishing incidents, and denial of service, typically result + in the loss of service, data, and resources both human and system. + Network providers and Computer Security Incident Response Teams need + to be equipped and ready to assist in communicating and tracing + security incidents with tools and procedures in place before the + occurrence of an attack. Real-time Inter-network Defense (RID) + outlines a proactive inter-network communication method to facilitate + sharing incident handling data while integrating existing detection, + tracing, source identification, and mitigation mechanisms for a + complete incident handling solution. Combining these capabilities in + a communication system provides a way to achieve higher security + levels on networks. Policy guidelines for handling incidents are + recommended and can be agreed upon by a consortium using the security + recommendations and considerations. + + RID has found use within the international research communities, but + has not been widely adopted in other sectors. This publication + provides the specification to those communities that have adopted it, + and communities currently considering solutions for real-time inter- + network defense. The specification may also accelerate development + of solutions where different transports or message formats are + required by leveraging the data elements and structures specified + here. + + + + + + + + + + + + + + + + + +Moriarty Informational [Page 1] + +RFC 6045 RID November 2010 + + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6045. + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + + + + + + + + + + + + + + + + +Moriarty Informational [Page 2] + +RFC 6045 RID November 2010 + + +Table of Contents + + 1. Introduction ....................................................4 + 1.1. Normative and Informative ..................................6 + 1.2. Terminology ................................................6 + 1.3. Attack Types and RID Messaging .............................6 + 2. RID Integration with Network Provider Technologies ..............8 + 3. Characteristics of Attacks ......................................9 + 3.1. Integrating Trace Approaches ..............................11 + 3.2. Superset of Packet Information for Traces .................11 + 4. Communication between Network Providers ........................12 + 4.1. Inter-Network Provider RID Messaging ......................14 + 4.2. RID Network Topology ......................................16 + 4.3. Message Formats ...........................................17 + 4.3.1. RID Data Types .....................................17 + 4.3.1.1. Boolean ...................................17 + 4.3.2. RID Messages and Transport .........................18 + 4.3.3. IODEF-RID Schema ...................................19 + 4.3.3.1. RequestStatus Class .......................21 + 4.3.3.2. IncidentSource Class ......................23 + 4.3.3.3. RIDPolicy Class ...........................24 + 4.3.4. RID Namespace ......................................29 + 4.4. RID Messages ..............................................29 + 4.4.1. TraceRequest .......................................29 + 4.4.2. RequestAuthorization ...............................30 + 4.4.3. Result .............................................31 + 4.4.4. Investigation Request ..............................33 + 4.4.5. Report .............................................35 + 4.4.6. IncidentQuery ......................................36 + 4.5. RID Communication Exchanges ...............................37 + 4.5.1. Upstream Trace Communication Flow ..................39 + 4.5.1.1. RID TraceRequest Example ..................40 + 4.5.1.2. RequestAuthorization Message Example ......44 + 4.5.1.3. Result Message Example ....................44 + 4.5.2. Investigation Request Communication Flow ...........47 + 4.5.2.1. Investigation Request Example .............48 + 4.5.2.2. RequestAuthorization Message Example ......50 + 4.5.3. Report Communication ...............................51 + 4.5.3.1. Report Example ............................51 + 4.5.4. IncidentQuery Communication Flow ...................54 + 4.5.4.1. IncidentQuery Example .....................54 + 5. RID Schema Definition ..........................................55 + + + + + + + + + +Moriarty Informational [Page 3] + +RFC 6045 RID November 2010 + + + 6. Security Considerations ........................................60 + 6.1. Message Transport .........................................62 + 6.2. Message Delivery Protocol - Integrity and Authentication ..63 + 6.3. Transport Communication ...................................63 + 6.4. Authentication of RID Protocol ............................64 + 6.4.1. Multi-Hop TraceRequest Authentication ..............65 + 6.5. Consortiums and Public Key Infrastructures ................66 + 6.6. Privacy Concerns and System Use Guidelines ................67 + 7. IANA Considerations ............................................72 + 8. Summary ........................................................72 + 9. References .....................................................73 + 9.1. Normative References ......................................73 + 9.2. Informative References ....................................74 + Acknowledgements ..................................................75 + Sponsor Information ...............................................75 + +1. Introduction + + Incident handling involves the detection, reporting, identification, + and mitigation of an attack, whether it be a system compromise, + socially engineered phishing attack, or a denial-of-service (DoS) + attack. When an attack is detected, the response may include simply + filing a report, notification to the source of the attack, a request + for mitigation, or the request to locate the source. One of the more + difficult cases is that in which the source of an attack is unknown, + requiring the ability to trace the attack traffic iteratively + upstream through the network for the possibility of any further + actions to take place. In cases when accurate records of an active + session between the victim system and the attacker or source system + are available, the source is easy to identify. The problem of + tracing incidents becomes more difficult when the source is obscured + or spoofed, logs are deleted, and the number of sources is + overwhelming. If the source of an attack is known or identified, it + may be desirable to request actions be taken to stop or mitigate the + effects of the attack. + + Current approaches to mitigating the effects of security incidents + are aimed at identifying and filtering or rate-limiting packets from + attackers who seek to hide the origin of their attack by source + address spoofing from multiple locations. Measures can be taken at + network provider (NP) edge routers providing ingress, egress, and + broadcast filtering as a recommended best practice in [RFC2827]. + + Network providers have devised solutions, in-house or commercial, to + trace attacks across their backbone infrastructure to either identify + the source on their network or on the next upstream network in the + path to the source. Techniques such as collecting packets as traffic + traverses the network have been implemented to provide the capability + + + +Moriarty Informational [Page 4] + +RFC 6045 RID November 2010 + + + to trace attack traffic after an incident has occurred. Other + methods use packet-marking techniques or flow-based traffic analysis + to trace traffic across the network in real time. The single-network + trace mechanisms use similar information across the individual + networks to trace traffic. Problems may arise when an attempt is + made to have a trace continued through the next upstream network + since the trace mechanism and management may vary. + + In the case in which the traffic traverses multiple networks, there + is currently no established communication mechanism for continuing + the trace. If the next upstream network has been identified, a phone + call might be placed to contact the network administrators in an + attempt to have them continue the trace. A communication mechanism + is needed to facilitate the transfer of information to continue + traces accurately and efficiently to upstream networks. The + communication mechanism described in this paper, Real-time Inter- + network Defense (RID), takes into consideration the information + needed by various single-network trace implementations and the + requirement for network providers to decide if a TraceRequest should + be permitted to continue. The data in RID messages is represented in + an Extensible Markup Language (XML) [XML1.0] document using the + Incident Object Description Exchange Format (IODEF) and RID. By + following this model, integration with other aspects of the network + for incident handling is simplified. Finally, methods are + incorporated into the communication system to indicate what actions + need to be taken closest to the source in order to halt or mitigate + the effects of the attack at hand. RID is intended to provide a + method to communicate the relevant information between Computer + Security Incident Response Teams (CSIRTs) while being compatible with + a variety of existing and possible future detection tracing and + response approaches. + + At this point, RID has found use within the international research + communities, but has not been widely adopted in other sectors. This + publication provides the specification to those communities that have + adopted it, and communities currently considering solutions for real- + time inter-network defense. The specification may also accelerate + development of solutions where different transports or message + formats are required by leveraging the data elements and structures + specified here. + + Security and privacy considerations are of high concern since + potentially sensitive information may be passed through RID messages. + RID messaging takes advantage of XML security and privacy policy + information set in the RID schema. The RID schema acts as an XML + envelope to support the communication of IODEF documents for + exchanging or tracing information regarding security incidents. RID + messages are encapsulated for transport, which is defined in a + + + +Moriarty Informational [Page 5] + +RFC 6045 RID November 2010 + + + separate document [RFC6046]. The authentication, integrity, and + authorization features each layer has to offer are used to achieve a + necessary level of security. + +1.1. Normative and Informative + + The XML schema [XMLschema] and transport requirements contained in + this document are normative; all other information provided is + intended as informative. More specifically, the following sections + of this document are intended as informative: Sections 1, 2, and 3; + and the sub-sections of 4 including the introduction to 4, 4.1, and + 4.2. The following sections of this document are normative: The + sub-sections of 4 including 4.3, 4.4, and 4.5; Section 5; and + Section 6. + +1.2. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +1.3. Attack Types and RID Messaging + + RID messaging is intended for use in coordinating incident handling + to locate the source of an attack and stop or mitigate the effects of + the attack. The attack types include system or network compromises, + denial-of-service attacks, or other malicious network traffic. RID + is essentially a messaging system coordinating attack detection, + tracing mechanisms, and the incident handling responses to locate the + source of traffic. If a source address is spoofed, a more detailed + trace of a packet (RID TraceRequest) would be required to locate the + true source. If the source address is valid, the incident handling + may only involve the use of routing information to determine what + network provider is closest to the source (RID Investigation request) + and can assist with the remediation. The type of RID message used to + locate a source is determined by the validity of the source address. + RID message types are discussed in Section 4.3. + + DoS [DoS] attacks are characterized by large amounts of traffic + destined for particular Internet locations and can originate from a + single or multiple sources. An attack from multiple sources is known + as a distributed denial-of-service (DDoS) attack. Because DDoS + attacks can originate from multiple sources, tracing such an attack + can be extremely difficult or nearly impossible. Many TraceRequests + may be required to accomplish the task and may require the use of + dedicated network resources to communicate incident handling + information to prevent a DoS attack against the RID system and + network used for tracing and remediation. Provisions are suggested + + + +Moriarty Informational [Page 6] + +RFC 6045 RID November 2010 + + + to reduce the load and prevent the same trace from occurring twice on + a single-network backbone discussed in Section 4 on communication + between NPs. The attacks can be launched from systems across the + Internet unified in their efforts or by compromised systems enlisted + as "zombies" that are controlled by servers, thereby providing + anonymity to the controlling server of the attack. This scenario may + require multiple RID traces, one to locate the zombies and an + additional one to locate the controlling server. DDoS attacks do not + necessarily spoof the source of an attack since there are a large + number of source addresses, which make it difficult to trace anyway. + DDoS attacks can also originate from a single system or a subset of + systems that spoof the source address in packet headers in order to + mask the identity of the attack source. In this case, an iterative + trace through the upstream networks in the path of the attack traffic + may be required. + + RID traces may also be used to locate a system used in an attack to + compromise another system. Compromising a system can be accomplished + through one of many attack vectors, using various techniques from a + remote host or through local privilege escalation attempts. The + attack may exploit a system or application level vulnerability that + may be the result of a design flaw or a configuration issue. A + compromised system, as described above, can be used to later attack + other systems. A single RID Investigation request may be used in + this case since it is probable that the source address is valid. + Identifying the sources of system compromises may be difficult since + an attacker may access the compromised system from various sources. + The attacker may also take measures to hide their tracks by deleting + log files or by accessing the system through a series of compromised + hosts. Iterative RID traces may be required for each of the + compromised systems used to obscure the source of the attack. If the + source address is valid, an Investigation request may be used in lieu + of a full RID TraceRequest. + + Once an attack has been reported, CSIRTs may want to query other + CSIRTs if they have detected an attack or simply report that one has + taken place. The Report message can be used to file a report without + an action taken, and an IncidentQuery can be used to ask if an attack + has been seen by another CSIRT. + + System compromises may result from other security incident types such + as worms, Trojans, or viruses. It is often the case that an incident + goes unreported even if valid source address information is available + because it is difficult to take any action to mitigate or stop the + attack. Incident handling is a difficult task for an NP and even at + some client locations due to network size and resource limitations. + + + + + +Moriarty Informational [Page 7] + +RFC 6045 RID November 2010 + + +2. RID Integration with Network Provider Technologies + + For the purpose of this document, a network provider (NP) shall be + defined as a backbone infrastructure manager of a network. The + network provider's Computer Security Incident Response Team shall be + referred to as the CSIRT. The backbone may be that of an + organization providing network (Internet or private) access to + commercial, personal, government, or educational institutions, or the + backbone provider of the connected network. The connected network + provider is an extension meant to include Intranet and Extranet + providers as well as instances such as a business or educational + institute's private network. + + NPs typically manage and monitor their networks through a centralized + network management system (NMS). The acronym "NMS" will be used to + generically represent management systems on a network used for the + management of network resources. An incident handling system (IHS) + is used to communicate RID messages and may be integrated with an NMS + as well as other components of the network. The components of the + network that may be integrated through the RID messaging system + include attack or event detection, network tracing, and network + devices to stop the effects of an attack. + + The detection of security incidents may rely on manual reporting, + automated intrusion detection tools, and variations in traffic types + or levels on a network. Intrusion detection systems (IDSs) may be + integrated into the IHS to create IODEF documents or RID messages to + facilitate security incident handling. Detection of a security + incident is outside the scope of this paper; however, it should be + possible to integrate detection methods with RID messaging. + + RID messaging in an IHS is intended to be flexible in order to + accommodate various traceback systems currently in use as well as + those that may evolve with technology. RID is intended to + communicate the necessary information needed by a trace mechanism to + the next upstream NP in the path of a trace. Therefore, a RID + message must carry the superset of data required for all tracing + systems. If possible, the trace may need to inspect packets to + determine a pattern, which could assist reverse path identification. + This may be accomplished by inspecting packet header information such + as the source and destination IP addresses, ports, and protocol flags + to determine if there is a way to distinguish the packets being + traced from other packets. A description of the incident along with + any available automated trace data should trigger an alert to the + NP's CSIRT for further investigation. The various technologies used + to trace traffic across a network are described in Section 3.1. + + + + + +Moriarty Informational [Page 8] + +RFC 6045 RID November 2010 + + + Another area of integration is the ability to mitigate or stop attack + traffic once a source has been located. Any automated solution + should consider the possible side effects to the network. A change + control process or a central point for configuration management might + be used to ensure that the security of the network and necessary + functionality are maintained and that equipment configuration changes + are documented. Automated solutions may depend upon the capabilities + and current configuration management solutions on a particular + network. The solutions may be based on HTTP/TLS (Transport Layer + Security) or an appropriate protocol defined in the transport + specification. + +3. Characteristics of Attacks + + The goal of tracing a security incident may be to identify the source + or to find a point on the network as close to the origin of the + incident as possible. A security incident may be defined as a system + compromise, a worm or Trojan infection, or a single- or multiple- + source denial-of-service attack. Incident tracing can be used to + identify the source(s) of an attack in order to halt or mitigate the + undesired behavior. The communication system, RID, described in this + paper can be used to trace any type of security incident and allows + for actions to be taken when the source of the attack or a point + closer to the source is known or has been identified. The purpose of + tracing an attack would be to halt or mitigate the effects of the + attack through methods such as filtering or rate-limiting the traffic + close to the source or by using methods such as taking the host or + network offline. Care must also be taken to ensure that the system + is not abused and to use proper analysis in determining if attack + traffic is, in fact, attack traffic at each NP along the path of a + trace. + + Tracing security incidents can be a difficult task since attackers go + to great lengths to obscure their identity. In the case of a + security incident, the true source might be identified through an + existing established connection to the attacker's point of origin. + However, the attacker may not connect to the compromised system for a + long period of time after the initial compromise or may access the + system through a series of compromised hosts spread across the + network. Other methods of obscuring the source may include targeting + the host with the same attack from multiple sources using both valid + and spoofed source addresses. This tactic can be used to compromise + a machine and leave the difficult task of locating the true origin + for the administrators. Security incidents, including DDoS attacks, + can be difficult or nearly impossible to trace because of the nature + of the attack. Some of the difficulties in tracing attacks include + the following: + + + + +Moriarty Informational [Page 9] + +RFC 6045 RID November 2010 + + + o the attack originates from multiple sources; + + o the attack may include various types of traffic meant to consume + server resources, such as a SYN flood attack without a significant + increase in bandwidth utilization; + + o the type of traffic could include valid destination services, + which cannot be blocked since they are essential services to + business, such as DNS servers at an NP or HTTP requests sent to an + organization connected to the Internet; + + o the attack may utilize varying types of packets including TCP, + UDP, ICMP, or other IP protocols; + + o the attack may be from "zombies", which then require additional + searches to locate a controlling server as the true origin of the + attack; + + o the attack may use a very small number of packets from any + particular source, thus making a trace after the fact nearly + impossible. + + If the source(s) of the attack cannot be determined from IP address + information or tracing the increased bandwidth utilization, it may be + possible to trace the traffic based on the type of packets seen by + the client. In the case of packets with spoofed source addresses, it + is no longer a trivial task to identify the source of an attack. In + the case of an attack using valid source addresses, methods such as + the traceroute utility can be used to fairly accurately identify the + path of the traffic between the source and destination of an attack. + If the true source has been identified, actions should be taken to + halt or mitigate the effects of the attack by reporting the incident + to the NP or the upstream NP closest to the source. In the case of a + spoofed source address, other methods can be used to trace back to + the source of an attack. The methods include packet filtering, + packet hash comparisons, IP marking techniques, ICMP traceback, and + packet flow analysis. As in the case of attack detection, tracing + traffic across a single network is a function that can be used with + RID in order to provide the network with the ability to trace spoofed + traffic to the source, while RID provides all the necessary + information to accommodate the approach used on any single network to + accomplish this task. RID can also be used to report attack traffic + close to the source where the IP address used was determined to be + valid or simply to report that an incident occurred. + + + + + + + +Moriarty Informational [Page 10] + +RFC 6045 RID November 2010 + + +3.1. Integrating Trace Approaches + + There have been many separate research initiatives to solve the + problem of tracing upstream packets to detect the true source of + attack traffic. Upstream packet tracing is currently confined to the + borders of a network or an NP's network. Traces require access to + network equipment and resources, thus potentially limiting a trace to + a specific network. Once a trace reaches the boundaries of a + network, the network manager or NP adjacent in the upstream trace + must be contacted in order to continue the trace. NPs have been + working on individual solutions to accomplish upstream tracing within + their own network environments. The tracing mechanisms implemented + thus far have included proprietary or custom solutions requiring + specific information such as IP packet header data, hash values of + the attack packets, or marked packets. Hash values are used to + compare a packet against a database of packets that have passed + through the network as described in "Hash-Based IP Traceback" + [HASH-IPtrace]. Other research solutions involve marking packets as + explained in "ICMP Traceback Messages" [ICMPtrace], "Practical + network support for IP traceback" [NTWK-IPtrace], the IP Flow + Information eXport (IPFIX) protocol [RFC3917], and IP marking + [IPtrace]. The single-network traceback solutions were considered in + developing RID to determine the information needed to accomplish an + inter-network trace where different solutions may be in place. + +3.2. Superset of Packet Information for Traces + + In order for network traffic to be traced across a network, an + example packet from the attack must be sent along with the + TraceRequest or Investigation request. According to the research for + hash-based IP traceback, all of the non-changing fields of an IP + header along with 8 bytes of payload are required to provide enough + information to uniquely trace the path of a packet. The non-changing + fields of the packet header and the 8 bytes of payload are the + superset of data required by most single-network tracing systems + used; limiting the shared data to the superset of the packet header + and 8 bytes of payload prevents the need for sharing potentially + sensitive information that may be contained in the data portion of a + packet. + + The RecordItem class in the IODEF is used to store a hexadecimal + formatted packet including all packet header information plus 8 bytes + of payload, or the entire packet contents. The above trace systems + do not require a full packet, but it may be useful in some cases, so + the option is given to allow a full packet to be included in the data + model. + + + + + +Moriarty Informational [Page 11] + +RFC 6045 RID November 2010 + + + If a subset of a packet is used, the research presented in "Hash- + Based IP Traceback" [HASH-IPtrace] provides guidelines to establish a + minimum requirement for distinguishing packets. The full packet and + content SHOULD be provided, but the minimum requirement MUST be + provided. The research from [HASH-IPtrace] found that the first 28 + invariant bytes of a packet (masked IP header plus the first 8 bytes + of the payload) are sufficient to differentiate almost all non- + identical IPv4 packets. RID requires the first 28 invariant bytes of + an IPv4 packet in order to perform a trace. RID requires the first + 48 invariant bytes for an IPv6 packet in order to distinguish the + packet in a trace. Reference [HASH-IPtrace] for additional details. + + The input mechanism for packets to be traced should be flexible to + allow intrusion detection systems or packet sniffers to provide the + information. The system creating the RID message should also use the + packet information to populate the Incident class information in + order to avoid human error and also allow a system administrator to + override the automatically populated information. + +4. Communication between Network Providers + + Note: The Introduction, and Sub-sections 4.1 and 4.2, are + informative, with the exception of references to IODEF/RID Transport + [RFC6046]. Sub-sections 4.3, 4.4, and 4.5 are normative. + + Expediting the communication between CSIRTs is essential when + responding to a security-related incident, which may cross network + access points (Internet backbones) between providers. As a result of + the urgency involved in this inter-NP security incident + communication, there must be an effective system in place to + facilitate the interaction. This communication policy or system + should involve multiple means of communication to avoid a single + point of failure. Email is one way to transfer information about the + incident, packet traces, etc. However, email may not be received in + a timely fashion or be acted upon with the same urgency as a phone + call or other communication mechanism. + + Each NP should dedicate a phone number to reach a member of their + respective CSIRT. The phone number could be dedicated to inter-NP + incident communications and must be a hotline that provides a 24x7 + live response. The phone line should reach someone who would have + the authority, expertise, and the means to expedite the necessary + action to investigate the incident. This may be a difficult policy + to establish at smaller NPs due to resource limitations, so another + solution may be necessary. An outside group may be able to serve + this function if given the necessary access to the NP's network. The + outside resource should be able to mitigate or alleviate the + financial limitations and any lack of experienced resource personnel. + + + +Moriarty Informational [Page 12] + +RFC 6045 RID November 2010 + + + A technical solution to trace traffic across a single NP may include + homegrown or commercial systems for which RID messaging must + accommodate the input requirements. The IHS used on the NP's + backbone by the CSIRT to coordinate the trace across the single + network requires a method to accept and process RID messages and + relay TraceRequests to the system, as well as to wait for responses + from the system to continue the RID request process as appropriate. + In this scenario, each NP would maintain its own RID/IHS and + integrate with a management station used for network monitoring and + analysis. An alternative for NPs lacking sufficient resources may be + to have a neutral third party with access to the NP's network + resources who could be used to perform the incident handling + functions. This could be a function of a central organization + operating as a CSIRT for the Internet as a whole or within a + consortium that may be able to provide centralized resources. + Consortiums would consist of a group of NPs and/or CSIRTs that agree + to participate in the RID communication protocol with an agreed-upon + policy and communication protocol facilitating the secure transport + of IODEF/RID XML documents. Transport for RID messages is specified + in the IODEF/RID Transport [RFC6046] document. + + One goal of RID is to prevent the need to permit access to other + networks' equipment through the use of a standard messaging mechanism + to enable IHSs to communicate incident handling information to other + networks in a consortium or in neighboring networks. The third party + mentioned above may be used in this technical solution to assist in + facilitating incident handling and possibly traceback through smaller + NPs. The RID messaging mechanism may be a logical or physical out- + of-band network to ensure that the communication is secure and + unaffected by the state of the network under attack. The two + management methods would accommodate the needs of larger NPs to + maintain full management of their network, and the third-party option + could be available to smaller NPs who lack the necessary human + resources to perform incident handling operations. The first method + enables the individual NPs to involve their network operations staff + to authorize the continuance of a trace or other necessary response + to a RID communication request through their network via a + notification and alerting system. The out-of-band logical solution + for messaging may be permanent virtual circuits configured with a + small amount of bandwidth dedicated to RID communications between + NPs. + + The network used for the communication should consist of out-of-band + or protected channels (direct communication links) or encrypted + channels dedicated to the transport of RID messages. The + communication links would be direct connections between network peers + who have agreed-upon use and abuse policies through the use of a + consortium. Consortiums might be linked through policy comparisons + + + +Moriarty Informational [Page 13] + +RFC 6045 RID November 2010 + + + and additional agreements to form a larger web or iterative network + of peers that correlates to the traffic paths available over the + larger web of networks. The maintenance of the individual links is + the responsibility of the two network peers hosting the link. + Contact information, IP addresses of RID systems, and other + information must be coordinated between bilateral peers by a + consortium and may use existing databases, such as the Routing + Arbiter. The security, configuration, and Confidence rating schemes + of the RID messaging peers must be negotiated by peers and must meet + certain overall requirements of the fully connected network + (Internet, government, education, etc.) through the peering and/or a + consortium-based agreement. + + RID messaging established with clients of an NP may be negotiated in + a contract as part of a value-added service or through a service + level agreement (SLA). Further discussion is beyond the scope of + this document and may be more appropriately handled in network + peering or service level agreements. + + Procedures for incident handling need to be established and well + known by anyone that may be involved in incident response. The + procedures should also contain contact information for internal + escalation procedures, as well as for external assistance groups such + as a CSIRT, CERT Coordination Center (CERT/CC), Global Information + Assurance Certification (GIAC), and the FBI or other assisting + government organization in the country of the investigation. + +4.1. Inter-Network Provider RID Messaging + + In order to implement a messaging mechanism between RID communication + systems or IHSs, a standard protocol and format is required to ensure + inter-operability between vendors. The messages would have to meet + several requirements in order to be meaningful as they traverse + multiple networks. RID provides the framework necessary for + communication between networks involved in the incident handling, + possible traceback, and mitigation of a security incident. Several + message types described in Section 4.3 are necessary to facilitate + the handling of a security incident. The message types include the + Report, IncidentQuery, TraceRequest, RequestAuthorization, Result, + and the Investigation request message. The Report message is used + when an incident is to be filed on a RID system or associated + database, where no further action is required. An IncidentQuery + message is used to request information on a particular incident. A + TraceRequest message is used when the source of the traffic may have + been spoofed. In that case, each network provider in the upstream + path who receives a TraceRequest will issue a trace across the + network to determine the upstream source of the traffic. The + RequestAuthorization and Result messages are used to communicate the + + + +Moriarty Informational [Page 14] + +RFC 6045 RID November 2010 + + + status and result of a TraceRequest or Investigation request. The + Investigation request message would only involve the RID + communication systems along the path to the source of the traffic and + not the use of network trace systems. The Investigation request + leverages the bilateral relationships or a consortium's + interconnections to mitigate or stop problematic traffic close to the + source. Routes could determine the fastest path to a known source IP + address in the case of an Investigation request. A message sent + between RID systems for a TraceRequest or an Investigation request to + stop traffic at the source through a bordering network would require + the information enumerated below: + + 1. Enough information to enable the network administrators to make a + decision about the importance of continuing the trace. + + 2. The incident or IP packet information needed to carry out the + trace or investigation. + + 3. Contact information of the origin of the RID communication. The + contact information could be provided through the Autonomous + System Number (ASN) [RFC1930] or Network Information Center (NIC) + handle information listed in the Registry for Internet Numbers or + other Internet databases. + + 4. Network path information to help prevent any routing loops through + the network from perpetuating a trace. If a RID system receives a + TraceRequest containing its own information in the path, the trace + must cease and the RID system should generate an alert to inform + the network operations staff that a tracing loop exists. + + 5. A unique identifier for a single attack. This identifier should + be used to correlate traces to multiple sources in a DDoS attack. + + Use of the communication network and the RID protocol must be for + pre-approved, authorized purposes only. It is the responsibility of + each participating party to adhere to guidelines set forth in both a + global use policy for this system and one established through the + peering agreements for each bilateral peer or agreed-upon consortium + guidelines. The purpose of such policies is to avoid abuse of the + system; the policies shall be developed by a consortium of + participating entities. The global policy may be dependent on the + domain it operates under; for example, a government network or a + commercial network such as the Internet would adhere to different + guidelines to address the individual concerns. Privacy issues must + be considered in public networks such as the Internet. Privacy + issues are discussed in the Security Considerations section, along + with other requirements that must be agreed upon by participating + entities. + + + +Moriarty Informational [Page 15] + +RFC 6045 RID November 2010 + + + RID requests must be legitimate security-related incidents and not + used for purposes such as sabotage or censorship. An example of such + abuse of the system would include a request to rate-limit legitimate + traffic to prevent information from being shared between users on the + Internet (restricting access to online versions of papers) or + restricting access from a competitor's product in order to sabotage a + business. + + The RID system should be configurable to either require user input or + automatically continue traces. This feature would enable a network + manager to assess the available resources before continuing a trace. + A trace initiated from a TraceRequest may cause adverse effects on a + network. If the Confidence rating is low, it may not be in the NP's + best interest to continue the trace. The Confidence ratings must + adhere to the specifications for selecting the percentage used to + avoid abuse of the system. TraceRequests must be issued by + authorized individuals from the initiating network, set forth in + policy guidelines established through peering or SLA. + +4.2. RID Network Topology + + The most basic topology for communicating RID systems would be a + direct connection or a bilateral relationship as illustrated below. + + ___________ __________ + | | | | + | RID |__________-------------___________| RID | + |_________| | NP Border | |________| + ------------- + + Figure 1. Direct Peer Topology + + Within the consortium model, several topologies might be agreed upon + and used. One would leverage bilateral network peering relationships + of the members of the consortium. The peers for RID would match that + of routing peers, and the logical network borders would be used. + This approach may be necessary for an iterative trace where the + source is unknown. The model would look like the above diagram; + however, there may be an extensive number of interconnections of + bilateral relationships formed. Also within a consortium model, it + may be useful to establish an integrated mesh of networks to pass RID + messages. This may be beneficial when the source address is known, + and an interconnection may provide a faster route to reach the + closest upstream peer to the source of the attack traffic. An + example is illustrated below. + + + + + + +Moriarty Informational [Page 16] + +RFC 6045 RID November 2010 + + + _______ _______ _______ + | | | | | | + __| RID |____-------------____| RID |____-------------____| RID |__ + |_____| | NP Border | |_____| | NP Border | |_____| + | ------------- ------------- | + |_______________________________________________________| + + Direct connection to network that is not an immediate network peer + + Figure 2. Mesh Peer Topology + + By using a fully meshed model in a consortium, broadcasting RID + requests would be possible, but not advisable. By broadcasting a + request, RID peers that may not have carried the attack traffic on + their network would be asked to perform a trace for the potential of + decreasing the time in which the true source was identified. As a + result, many networks would have utilized unnecessary resources for a + TraceRequest that may have also been unnecessary. + +4.3. Message Formats + + Section 4.3.2 describes the six RID message types, which are based on + the IODEF model [RFC5070]. The messages are generated and received + on RID communication systems on the NP's network. The messages may + originate from IODEF messages from intrusion detection servers, + CSIRTs, analysts, etc. A RID message uses the IODEF framework with + the RID extension, which is encapsulated for transport [RFC6046]. + Each RID message type, along with an example, is described in the + following sections. The IODEF-RID schema is introduced in + Section 4.3.3 to support the RID message types in Section 4.3.2. + +4.3.1. RID Data Types + + RID is derived from the IODEF data model and inherits all of the data + types defined in the IODEF model. One data type is added by RID: + BOOLEAN. + +4.3.1.1. Boolean + + A boolean value is represented by the BOOLEAN data type. + + The BOOLEAN data type is implemented as "xs:boolean" [XMLschema] in + the schema. + + + + + + + + +Moriarty Informational [Page 17] + +RFC 6045 RID November 2010 + + +4.3.2. RID Messages and Transport + + The six RID message types follow: + + 1. TraceRequest. This message is sent to the RID system next in the + upstream trace. It is used to initiate a TraceRequest or to + continue a TraceRequest to an upstream network closer to the + source address of the origin of the security incident. The + TraceRequest would trigger a traceback on the network to locate + the source of the attack traffic. + + 2. RequestAuthorization. This message is sent to the initiating RID + system from each of the upstream NPs' RID systems to provide + information on the request status in the current network. + + 3. Result. This message is sent to the initiating RID system through + the network of RID systems in the path of the trace as + notification that the source of the attack was located. The + Result message is also used to provide the notification of actions + taken for an Investigation request. + + 4. Investigation. This message type is used when the source of the + traffic is believed not to be spoofed. The purpose of the + Investigation request message is to leverage the existing peer + relationships in order to notify the network provider closest to + the source of the valid traffic of a security-related incident for + any necessary actions to be taken. + + 5. Report. This message is used to report a security incident, for + which no action is requested. This may be used for the purpose of + correlating attack information by CSIRTs, statistics and trending + information, etc. + + 6. IncidentQuery. This message is used to request information about + an incident or incident type from a trusted RID system. The + response is provided through the Report message. + + When a system receives a RID message, it must be able to determine + the type of message and parse it accordingly. The message type is + specified in the RIDPolicy class. The RIDPolicy class may also be + used by the transport protocol to facilitate the communication of + security incident data to trace, investigate, query, or report + information regarding security incidents. + + + + + + + + +Moriarty Informational [Page 18] + +RFC 6045 RID November 2010 + + +4.3.3. IODEF-RID Schema + + There are three classes included in the RID extension required to + facilitate RID communications. The RequestStatus class is used to + indicate the approval status of a TraceRequest or Investigation + request; the IncidentSource class is used to report whether or not a + source was found and to identify the source host(s) or network(s); + and the RIDPolicy class provides information on the agreed-upon + policies and specifies the type of communication message being used. + + The RID schema acts as an envelope for the IODEF schema to facilitate + RID communications. The intent in maintaining a separate schema and + not using the AdditionalData extension of IODEF is the flexibility of + sending messages between RID hosts. Since RID is a separate schema + that includes the IODEF schema, the RID information acts as an + envelope, and then the RIDPolicy class can be easily extracted for + use by the transport protocol. The security requirements of sending + incident information across the network include the use of + encryption. The RIDPolicy information is not required to be + encrypted, so separating out this data from the IODEF extension + removes the need for decrypting and parsing the entire IODEF and RID + document to determine how it should be handled at each RID host. + + The purpose of the RIDPolicy class is to specify the message type for + the receiving host, facilitate the policy needs of RID, and provide + routing information in the form of an IP address of the destination + RID system. + + The policy information and guidelines are discussed in Section 6.6. + The policy is defined between RID peers and within or between + consortiums. The RIDPolicy is meant to be a tool to facilitate the + defined policies. This MUST be used in accordance with policy set + between clients, peers, consortiums, and/or regions. Security, + privacy, and confidentiality MUST be considered as specified in this + document. + + + + + + + + + + + + + + + + +Moriarty Informational [Page 19] + +RFC 6045 RID November 2010 + + + The RID schema is defined as follows: + + +------------------+ + | RID | + +------------------+ + | ANY | + | |<>---{0..1}----[ RIDPolicy ] + | ENUM restriction | + | ENUM type |<>---{0..1}----[ RequestStatus ] + | STRING meaning | + | |<>---{0..1}----[ IncidentSource ] + +------------------+ + + Figure 3. The RID Schema + + The aggregate classes that constitute the RID schema in the iodef-rid + namespace are as follows: + + RIDPolicy + + Zero or One. The RIDPolicy class is used by all message types to + facilitate policy agreements between peers, consortiums, or + federations, as well as to properly route messages. + + RequestStatus + + Zero or One. The RequestStatus class is used only in + RequestAuthorization messages to report back to the originating + RID system if the trace will be continued by each RID system that + received a TraceRequest in the path to the source of the traffic. + + IncidentSource + + Zero or One. The IncidentSource class is used in the Result + message only. The IncidentSource provides the information on the + identified source host or network of an attack trace or + investigation. + + Each of the three listed classes may be the only class included in + the RID class, hence the option for zero or one. In some cases, + RIDPolicy MAY be the only class in the RID definition when used by + the transport protocol [RFC6046], as that information should be as + small as possible and may not be encrypted. The RequestStatus + message MUST be able to stand alone without the need for an IODEF + document to facilitate the communication, limiting the data + transported to the required elements per [RFC6046]. + + + + + +Moriarty Informational [Page 20] + +RFC 6045 RID November 2010 + + +4.3.3.1. RequestStatus Class + + The RequestStatus class is an aggregate class in the RID class. + + +--------------------------------+ + | RequestStatus | + +--------------------------------+ + | | + | ENUM restriction | + | ENUM AuthorizationStatus | + | ENUM Justification | + | STRING ext-AuthorizationStatus | + | STRING ext-Justification | + | | + +--------------------------------+ + + Figure 4. The RequestStatus Class + + The RequestStatus class has five attributes: + + restriction + + OPTIONAL. ENUM. This attribute indicates the disclosure + guidelines to which the sender expects the recipient to adhere. + This guideline provides no real security since it is the choice of + the recipient of the document to honor it. This attribute follows + the same guidelines as "restriction" used in IODEF. + + AuthorizationStatus + + REQUIRED. ENUM. The listed values are used to provide a response + to the requesting CSIRT of the status of a TraceRequest in the + current network. + + 1. Approved. The trace was approved and will begin in the + current NP. + + 2. Denied. The trace was denied in the current NP. The next + closest NP can use this message to filter traffic from the + upstream NP using the example packet to help mitigate the + effects of the attack as close to the source as possible. The + RequestAuthorization message must be passed back to the + originator and a Result message used from the closest NP to the + source to indicate actions taken in the IODEF History class. + + + + + + + +Moriarty Informational [Page 21] + +RFC 6045 RID November 2010 + + + 3. Pending. Awaiting approval; a timeout period has been reached, + which resulted in this Pending status and RequestAuthorization + message being generated. + + 4. ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + Justification + + OPTIONAL. ENUM. Provides a reason for a Denied or Pending + message. + + 1. SystemResource. A resource issue exists on the systems that + would be involved in the request. + + 2. Authentication. The enveloped digital signature [RFC3275] + failed to validate. + + 3. AuthenticationOrigin. The detached digital signature for the + original requestor on the IP packet failed to validate. + + 4. Encryption. Unable to decrypt the request. + + 5. Other. There were other reasons this request could not be + processed. + + 6. ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + AuthorizationStatus-ext + + OPTIONAL. STRING. A means by which to extend the + AuthorizationStatus attribute. See IODEF [RFC5070], Section 5.1. + + Justification-ext + + OPTIONAL. STRING. A means by which to extend the Justification + attribute. See IODEF [RFC5070], Section 5.1. + + + + + + + + + + + + + +Moriarty Informational [Page 22] + +RFC 6045 RID November 2010 + + +4.3.3.2. IncidentSource Class + + The IncidentSource class is an aggregate class in the RID class. + + +-------------------+ + | IncidentSource | + +-------------------+ + | | + | ENUM restriction | + | |<>-------------[ SourceFound ] + | | + | |<>---{0..*}----[ Node ] + | | + +-------------------+ + + Figure 5. The IncidentSource Class + + The elements that constitute the IncidentSource class follow: + + SourceFound + + One. BOOLEAN. The Source class indicates if a source was + identified. If the source was identified, it is listed in the + Node element of this class. + + True. Source of incident was identified. + False. Source of incident was not identified. + + Node + + One. The Node class is used to identify a host or network device, + in this case to identify the system communicating RID messages. + + The base definition of this class is reused from the IODEF + specification [RFC5070], Section 3.16. + + The IncidentSource class has one attribute: + + restriction + + OPTIONAL. ENUM. This attribute indicates the disclosure + guidelines to which the sender expects the recipient to adhere. + This guideline provides no real security since it is the choice of + the recipient of the document to honor it. This attribute follows + the same guidelines as "restriction" used in IODEF. + + + + + + +Moriarty Informational [Page 23] + +RFC 6045 RID November 2010 + + +4.3.3.3. RIDPolicy Class + + The RIDPolicy class facilitates the delivery of RID messages and is + also referenced for transport in the transport document [RFC6046]. + + +------------------------+ + | RIDPolicy | + +------------------------+ + | | + | ENUM restriction |<>-------------[ Node ] + | ENUM MsgType | + | ENUM MsgDestination |<>---{0..1}----[ IncidentID ] + | ENUM ext-MsgType | + | ENUM ext-MsgDestination|<>---{1..*}----[ PolicyRegion ] + | | + | |<>---{1..*}----[ TrafficType ] + | | + +------------------------+ + + Figure 6. The RIDPolicy Class + + The aggregate elements that constitute the RIDPolicy class are as + follows: + + Node + + One. The Node class is used to identify a host or network device, + in this case to identify the system communicating RID messages. + + The base definition of this class is reused from the IODEF + specification [RFC5070], Section 3.16. + + IncidentID + + Zero or one. Global reference pointing back to the IncidentID + defined in the IODEF data model. The IncidentID includes the name + of the CSIRT, an incident number, and an instance of that + incident. The instance number is appended with a dash separating + the values and is used in cases for which it may be desirable to + group incidents. Examples of incidents that may be grouped would + be botnets, DDoS attacks, multiple hops of compromised systems + found during an investigation, etc. + + PolicyRegion + + One or many. REQUIRED. The values for the attribute "region" are + used to determine what policy area may require consideration + before a trace can be approved. The PolicyRegion may include + + + +Moriarty Informational [Page 24] + +RFC 6045 RID November 2010 + + + multiple selections from the attribute list in order to fit all + possible policy considerations when crossing regions, consortiums, + or networks. + + region + + One. ENUM. + + 1. ClientToNP. An enterprise network initiated the request. + + 2. NPToClient. An NP passed a RID request to a client or an + enterprise attached network to the NP based on the service + level agreements. + + 3. IntraConsortium. A trace that should have no restrictions + within the boundaries of a consortium with the agreed-upon use + and abuse guidelines. + + 4. PeerToPeer. A trace that should have no restrictions between + two peers but may require further evaluation before continuance + beyond that point with the agreed-upon use and abuse + guidelines. + + 5. BetweenConsortiums. A trace that should have no restrictions + between consortiums that have established agreed-upon use and + abuse guidelines. + + 6. AcrossNationalBoundaries. This selection must be set if the + trace type is anything but a trace of attack traffic with + malicious intent. This must also be set if the traffic request + is based upon regulations of a specific nation that would not + apply to all nations. This is different from the + "BetweenConsortiums" setting since it may be possible to have + multiple nations as members of the same consortium, and this + option must be selected if the traffic is of a type that may + have different restrictions in other nations. + + 7. ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + + + + + + + + + + + +Moriarty Informational [Page 25] + +RFC 6045 RID November 2010 + + + TrafficType + + One or many. REQUIRED. The values for the attribute "type" are + meant to assist in determining if a trace is appropriate for the + NP receiving the request to continue the trace. Multiple values + may be selected for this element; however, where possible, it + should be restricted to one value that would most accurately + describe the traffic type. + + type + + One. ENUM. + + 1. Attack. This option should only be selected if the traffic is + related to a network-based attack. The type of attack MUST + also be listed in more detail in the IODEF Method and Impact + classes for further clarification to assist in determining if + the trace can be continued ([RFC5070], Sections 3.9 and + 3.10.1). + + 2. Network. This option MUST only be selected when the trace is + related to NP network traffic or routing issues. + + 3. Content. This category MUST be used only in the case in which + the request is related to the content and regional restrictions + on accessing that type of content exist. This is not malicious + traffic but may include determining what sources or + destinations accessed certain materials available on the + Internet, including, but not limited to, news, technology, or + inappropriate content. + + 4. OfficialBusiness. This option MUST be used if the traffic + being traced is requested or is affiliated with any government + or other official business request. This would be used during + an investigation by government authorities or other government + traces to track suspected criminal or other activities. + + 5. Other. If this option is selected, a description of the + traffic type MUST be provided so that policy decisions can be + made to continue or stop the trace. The information should be + provided in the IODEF message in the Expectation class or in + the History class using a HistoryItem log. + + 6. ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + + + + + +Moriarty Informational [Page 26] + +RFC 6045 RID November 2010 + + + The RIDPolicy class has five attributes: + + restriction + + OPTIONAL. ENUM. This attribute indicates the disclosure + guidelines to which the sender expects the recipient to adhere. + This guideline provides no real security since it is the choice of + the recipient of the document to honor it. This attribute follows + the same guidelines as "restriction" used in IODEF. + + MsgType + + REQUIRED. ENUM. The type of RID message sent. The six types of + messages are described in Section 4.3.2 and can be noted as one of + the six selections below. + + 1. TraceRequest. This message may be used to initiate a + TraceRequest or to continue a TraceRequest to an upstream + network closer to the source address of the origin of the + security incident. + + 2. RequestAuthorization. This message is sent to the initiating + RID system from each of the upstream RID systems to provide + information on the request status in the current network. + + 3. Result. This message indicates that the source of the attack + was located and the message is sent to the initiating RID + system through the RID systems in the path of the trace. + + 4. Investigation. This message type is used when the source of + the traffic is believed to be valid. The purpose of the + Investigation request is to leverage the existing peer or + consortium relationships in order to notify the NP closest to + the source of the valid traffic that some event occurred, which + may be a security-related incident. + + 5. Report. This message is used to report a security incident, + for which no action is requested in the IODEF Expectation + class. This may be used for the purpose of correlating attack + information by CSIRTs, statistics and trending information, + etc. + + 6. IncidentQuery. This message is used to request information + from a trusted RID system about an incident or incident type. + + + + + + + +Moriarty Informational [Page 27] + +RFC 6045 RID November 2010 + + + Additionally, there is an extension attribute to add new + enumerated values: + + - ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + MsgDestination + + REQUIRED. ENUM. The destination required at this level may + either be the RID messaging system intended to receive the + request, or, in the case of an Investigation request, the source + of the incident. In the case of an Investigation request, the RID + system that can help stop or mitigate the traffic may not be + known, and the message may have to traverse RID messaging systems + by following the routing path to the RID system closest to the + source of the attack traffic. The Node element lists either the + RID system or the IP address of the source, and the meaning of the + value in the Node element is determined by the MsgDestination + element. + + 1. RIDSystem. The address listed in the Node element of the + RIDPolicy class is the next upstream RID system that will + receive the RID message. + + 2. SourceOfIncident. The address listed in the Node element of + the RIDPolicy class is the incident source. The IP address is + used to determine the path of RID systems that will be used to + find the closest RID system to the source of an attack in which + the IP address used by the source is believed to be valid and + an Investigation request message is used. This is not to be + confused with the IncidentSource class, as the defined value + here is from an initial trace or Investigation request, not the + source used in a Result message. + + 3. ext-value. An escape value used to extend this attribute. See + IODEF [RFC5070], Section 5.1. + + MsgType-ext + + OPTIONAL. STRING. A means by which to extend the MsgType + attribute. See IODEF [RFC5070], Section 5.1. + + MsgDestination-ext + + OPTIONAL. STRING. A means by which to extend the MsgDestination + attribute. See IODEF [RFC5070], Section 5.1. + + + + + +Moriarty Informational [Page 28] + +RFC 6045 RID November 2010 + + +4.3.4. RID Namespace + + The RID schema declares a namespace of "iodef-rid-1.0" and registers + it per [XMLnames]. Each IODEF-RID document MUST use the "iodef- + rid-1.0" namespace in the top-level element RID-Document. It can be + referenced as follows: + +<RID-Document + version="1.00" lang="en-US" + xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xsi:schemaLocation=http://www.iana.org/assignments/xml-registry/ + schema/iodef-rid-1.0.xsd"> + +4.4. RID Messages + + The IODEF model is followed as specified in [RFC5070] for each of the + RID message types. The RID schema is used in combination with IODEF + documents to facilitate RID communications. Each message type varies + slightly in format and purpose; hence, the requirements vary and are + specified for each. All classes, elements, attributes, etc., that + are defined in the IODEF-Document are valid in the context of a RID + message; however, some listed as optional in IODEF are mandatory for + RID as listed for each message type. The IODEF model MUST be fully + implemented to ensure proper parsing of all RID messages. + + Note: The implementation of the RID system may obtain some of the + information needed to fill in the content required for each message + type automatically from packet input to the system or default + information such as that used in the EventData class. + +4.4.1. TraceRequest + + Description: This message or document is sent to the network + management station next in the upstream trace once the upstream + source of the traffic has been identified. + + The following information is required for TraceRequest messages and + is provided through: + + RID Information: + + RIDPolicy + RID message type, IncidentID, and destination + policy information + + IODEF Information: + + Time Stamps (DetectTime, StartTime, EndTime, ReportTime). + + + +Moriarty Informational [Page 29] + +RFC 6045 RID November 2010 + + + Incident Identifier (Incident class, IncidentID). + Trace number - used for multiple traces of a single + incident; must be noted. + + Confidence rating of security incident (Impact and Confidence + class). + + System class is used to list both the Source and Destination + Information used in the attack and must note if the traffic + is spoofed, thus requiring an upstream TraceRequest in RID. + + Expectation class should be used to request any specific + actions to be taken close to the source. + + Path information of nested RID systems, beginning with the + request originator used in the trace using IODEF EventData + with category set to "infrastructure". + + Event, Record, and RecordItem classes to include example + packets and other information related to the incident. + Note: Event information included here requires a second + instance of EventData in addition to that used to convey NP + path contact information. + + Standards for encryption and digital signatures [RFC3275], + [XMLsig]: + + Digital signature from initiating RID system, passed to all + systems in upstream trace using XML digital signature. + + A DDoS attack can have many sources, resulting in multiple traces to + locate the sources of the attack. It may be valid to continue + multiple traces for a single attack. The path information would + enable the administrators to determine if the exact trace had already + passed through a single network. The Incident Identifier must also + be used to identify multiple TraceRequests from a single incident. + If a single TraceRequest results in divergent paths of TraceRequests, + a separate instance number MUST be used under the same IncidentID. + The IncidentID instance number of IODEF can be used to correlate + related incident data that is part of a larger incident. + +4.4.2. RequestAuthorization + + Description: This message is sent to the initiating RID system from + the next upstream NP's RID system to provide information on the + request status in the current network. + + + + + +Moriarty Informational [Page 30] + +RFC 6045 RID November 2010 + + + The following information is required for RequestAuthorization + messages and is provided through: + + RID Information: + + RIDPolicy + RID message type, IncidentID, and destination + policy information + + Status of TraceRequest + RequestStatus class in RID schema + + Standards for encryption and digital signatures [RFC3275], + [XMLsig]: + + Digital signature of responding NP for authenticity of Trace + Status Message, from the NP creating this message using XML + digital signature. + + A message is sent back to the initiating RID system of the trace as + status notification. This message verifies that the next RID system + in the path has received the message from the previous system in the + path. This message also verifies that the trace is now continuing, + has stopped, or is pending in the next upstream RID system. The + Pending status would be automatically generated after a 2-minute + timeout without system-predefined or administrator action taken to + approve or disapprove the trace continuance. If a Request is denied, + the originator and sending peer (if they are not the same) MUST both + receive the message. This enables the sending peer the option to + take action to stop or mitigate the traffic as close to the source as + possible. + +4.4.3. Result + + Description: This message indicates that the trace or investigation + has been completed and provides the result. The Result message + includes information on whether or not a source was found and the + source information through the IncidentSource class. The Result + information MUST go back to the originating RID system that began the + investigation or trace. An NP may use any number of incident + handling data sources to ascertain the true source of an attack. All + of the possible information sources may or may not be readily tied + into the RID communications system. + + + + + + + + +Moriarty Informational [Page 31] + +RFC 6045 RID November 2010 + + + The following information is required for Result messages and will be + provided through: + + RID Information: + + RIDPolicy + RID message type, IncidentID, and destination + policy information + + Incident Source + The IncidentSource class of the RID schema is used to note + if a source was identified and provide the source + address(es). + + IODEF Information: + + Time Stamps (DetectTime, StartTime, EndTime, ReportTime). + + Incident Identifier (Incident class, IncidentID). + Trace number - used for multiple traces of a single + incident; must be noted. + + Confidence rating of security incident (Impact and Confidence + class). + + System class is used to list both the Source and Destination + Information used in the attack and must note if the traffic + is spoofed, thus requiring an upstream TraceRequest in RID. + + History class "atype" attribute is used to note any actions + taken. + + History class also notes any other background information + including notes about the confidence level or rating of the + result information. + + Path information of nested RID systems, beginning with the + request originator used in the trace using IODEF EventData + with category set to "infrastructure". The last NP listed + is the NP that located the source of the traffic (the NP + sending the Result message). + + Event, Record, and RecordItem classes to include example + packets and other information related to the incident + (optional). + Note: Event information included here requires a second + instance of EventData in addition to that used to convey NP + path contact information. + + + +Moriarty Informational [Page 32] + +RFC 6045 RID November 2010 + + + Standards for encryption and digital signatures [RFC3275]: + + Digital signature of source NP for authenticity of Result + Message, from the NP creating this message using XML digital + signature. + + A message is sent back to the initiating RID system to notify the + associated CSIRT that the source has been located. The actual source + information may or may not be included, depending on the policy of + the network in which the client or host is attached. Any action + taken by the NP to act upon the discovery of the source of a trace + should be included. The NP may be able to automate the adjustment of + filters at their border router to block outbound access for the + machine(s) discovered as a part of the attack. The filters may be + comprehensive enough to block all Internet access until the host has + taken the appropriate action to resolve any security issues or to + rate-limit the ingress traffic as close to the source as possible. + + Security and privacy considerations discussed in Section 6 MUST be + taken into account. + + Note: The History class has been expanded in IODEF to accommodate all + of the possible actions taken as a result of a RID TraceRequest or + Investigation request using the "iodef:atype", or action type, + attribute. The History class should be used to note all actions + taken close to the source of a trace or incident using the most + appropriate option for the type of action along with a description. + The "atype" attribute in the Expectation class can also be used to + request an appropriate action when a TraceRequest or Investigation + request is made. + +4.4.4. Investigation Request + + Description: This message type is used when the source of the traffic + is believed not to be spoofed. The purpose of the Investigation + request message is to leverage the existing bilateral peer + relationships in order to notify the network provider closest to the + source of the valid traffic that some event occurred, which may be a + security-related incident. + + The following information is required for Investigation request + messages and is provided through: + + RID Information: + + RID Policy + RID message type, IncidentID, and destination + policy information + + + +Moriarty Informational [Page 33] + +RFC 6045 RID November 2010 + + + IODEF Information: + + Time Stamps (DetectTime, StartTime, EndTime, ReportTime). + + Incident Identifier (Incident class, IncidentID). + Trace number - used for multiple traces of a single + incident; must be noted. + + Confidence rating of security incident (Impact and Confidence + class). + + System class is used to list both the Source and Destination + Information used in the attack and must note if the traffic + is spoofed, thus requiring an upstream TraceRequest in RID. + + Expectation class should be used to request any specific + actions to be taken close to the source. + + Path information of nested RID systems, beginning with the + request originator used in the trace using IODEF EventData + with category set to "infrastructure". + + Event, Record, and RecordItem classes to include example + packets and other information related to the incident. + Note: Event information included here requires a second + instance of EventData in addition to that used to convey NP + path contact information. + + Standards for encryption and digital signatures [RFC3275]: + + Digital signature from initiating RID system, passed to all + systems in upstream trace using XML digital signature. + + Security considerations would include the ability to encrypt + [XMLencrypt] the contents of the Investigation request message using + the public key of the destination RID system. The incident number + would increase as if it were a TraceRequest message in order to + ensure uniqueness within the system. The relaying peers would also + append their Autonomous System (AS) or RID system information as the + request message was relayed along the web of network providers so + that the Result message could utilize the same path as the set of + trust relationships for the return message, thus indicating any + actions taken. The request would also be recorded in the state + tables of both the initiating and destination NP RID systems. The + destination NP is responsible for any actions taken as a result of + the request in adherence to any service level agreements or internal + policies. The NP should confirm that the traffic actually originated + from the suspected system before taking any action and confirm the + + + +Moriarty Informational [Page 34] + +RFC 6045 RID November 2010 + + + reason for the request. The request may be sent directly to a known + RID system or routed by the source address of the attack using the + message destination of RIDPolicy, SourceOfIncident. + + Note: All intermediate parties must be able to view RIDPolicy + information in order to properly direct RID messages. + +4.4.5. Report + + Description: This message or document is sent to a RID system to + provide a report of a security incident. This message does not + require any actions to be taken, except to file the report on the + receiving RID system or associated database. + + The following information is required for Report messages and will be + provided through: + + RID Information: + + RID Policy RID message type, IncidentID, and destination + policy information + + The following data is recommended if available and can be provided + through: + + IODEF Information: + + Time Stamps (DetectTime, StartTime, EndTime, ReportTime). + + Incident Identifier (Incident class, IncidentID). + Trace number - used for multiple traces of a single + incident; must be noted. + + Confidence rating of security incident (Impact and Confidence + class). + + System class is used to list both the Source and Destination + Information used in the attack. + + Event, Record, and RecordItem classes to include example + packets and other information related to the incident + (optional). + + Standards for encryption and digital signatures [RFC3275]: + + Digital signature from initiating RID system, passed to all + systems receiving the report using XML digital signature. + + + + +Moriarty Informational [Page 35] + +RFC 6045 RID November 2010 + + + Security considerations would include the ability to encrypt + [XMLencrypt] the contents of the Report message using the public key + of the destination RID system. Senders of a Report message should + note that the information may be used to correlate security incident + information for the purpose of trending, pattern detection, etc., and + may be shared with other parties unless otherwise agreed upon with + the receiving RID system. Therefore, sending parties of a Report + message may obfuscate or remove destination addresses or other + sensitive information before sending a Report message. A Report + message may be sent either to file an incident report or in response + to an IncidentQuery, and data sensitivity must be considered in both + cases. The NP path information is not necessary for this message, as + it will be communicated directly between two trusted RID systems. + +4.4.6. IncidentQuery + + Description: The IncidentQuery message is used to request incident + information from a trusted RID system. The request can include the + incident number, if known, or detailed information about the + incident. If the incident number is known, the Report message + containing the incident information can easily be returned to the + trusted requestor using automated methods. If an example packet or + other unique information is included in the IncidentQuery, the return + report may be automated; otherwise, analyst intervention may be + required. + + The following information must be used for an IncidentQuery message + and is provided through: + + RID Information: + + RID Policy + RID message type, IncidentID, and destination + policy information + + IODEF Information (optional): + + Time Stamps (DetectTime, StartTime, EndTime, ReportTime). + + Incident Identifier (Incident class, IncidentID). + Trace number - used for multiple traces of a single + incident; must be noted. + + Confidence rating of security incident (Impact and Confidence + class). + + System class is used to list both the Source and Destination + Information used in the attack. + + + +Moriarty Informational [Page 36] + +RFC 6045 RID November 2010 + + + Event, Record, and RecordItem classes to include example + packets and other information related to the incident + (optional). + + Standards for encryption and digital signatures [RFC3275]: + + Digital signature from initiating RID system, passed to all + systems receiving the IncidentQuery using XML digital + signature. If a packet is not included, the signature may be + based on the RIDPolicy class. + + The proper response to the IncidentQuery message is a Report message. + Multiple incidents may be returned for a single query if an incident + type is requested. In this case, the receiving system would send an + IODEF document containing multiple incidents or all instances of an + incident. The system sending the reply may pre-set a limit to the + number of documents returned in one report. The recommended limit + is 5, to prevent the documents from becoming too large. Other + transfer methods may be suited better than RID for large transfers of + data. The Confidence rating may be used in the IncidentQuery message + to select only incidents with an equal or higher Confidence rating + than what is specified. This may be used for cases when information + is gathered on a type of incident but not on specifics about a single + incident. Source and Destination Information may not be needed if + the IncidentQuery is intended to gather data about a specific type of + incident as well. + +4.5. RID Communication Exchanges + + The following section outlines the communication flows for RID and + also provides examples of messages. The proper response to a + TraceRequest is a RequestAuthorization message. The + RequestAuthorization message lets the requestor know if the trace + will continue through the next upstream network. If there is a + problem with the request, such as a failure to validate the digital + signature or decrypt the request, a RequestAuthorization message MUST + be sent to the requestor and the downstream peer (if they are not one + and the same) providing the reason why the message could not be + processed. Assuming that the trace continued, additional + TraceRequests with the response of a RequestAuthorization message + would occur passing the request upstream in the path to the source of + the traffic related to the incident. Once a source is found, a + Result message is sent to the originator of the trace, as determined + by the NP path information provided through the document instance of + EventData, where contact is set to "infrastructure". The NP path + information is also used when sending the RequestAuthorization + messages to the first entry (the trace originator) and the last + nested entry (the downstream peer). The Result message is encrypted + + + +Moriarty Informational [Page 37] + +RFC 6045 RID November 2010 + + + [XMLencrypt] for the originator providing information about the + incident source and any actions taken. If the originator fails to + decrypt or authenticate the Result message, a RequestAuthorization + message is sent in response; otherwise, no return message is sent. + If a RequestAuthorization message is sent with the RequestStatus set + to Denied, a downstream peer receiving this message may choose to + take action to stop or mitigate the traffic at that point in the + network, as close to the source as possible. If the downstream peer + chooses this option, it would send a Result message to the trace + originator. + + Note: For each example listed below, [RFC5735] addresses were used. + Assume that each IP address listed is actually a separate network + range held by different NPs. Addresses were used from /27 network + ranges. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Moriarty Informational [Page 38] + +RFC 6045 RID November 2010 + + +4.5.1. Upstream Trace Communication Flow + + The diagram below outlines the RID TraceRequest communication flow + between RID systems on different networks tracing an attack. + + Attack Dest NP-1 NP-2 NP-3 Attack Src + + 1. Attack | Attack + reported | detected + + 2. Initiate trace + + 3. Locate origin + through + upstream NP + + 4. o---TraceRequest-----> + + 5. Trace + Initiated + + 6. <-RequestAuthorization-o + + 7. Locate origin + through + upstream NP + + 8. o---TraceRequest---> + + 9. Trace Initiated + + 10. <----------RequestAuthorization----o + <---RequestAuth---o + + 11. Locate attack + source on network X + + 12. <------------Result----------------o + + Figure 7. TraceRequest Communication Flow + + Before a trace is initiated, the RID system should verify if an + instance of the trace or a similar request is not active. The traces + may be resource intensive; therefore, providers need to be able to + detect potential abuse of the system or unintentional resource + drains. Information such as the Source and Destination Information, + associated packets, and the incident may be desirable to maintain for + a period of time determined by administrators. + + + +Moriarty Informational [Page 39] + +RFC 6045 RID November 2010 + + + The communication flow demonstrates that a RequestAuthorization + message is sent to both the downstream peer and the original + requestor. If a TraceRequest is denied, the downstream peer has the + option to take an action and respond with a Result message. The + originator of the request may follow up with the downstream peer of + the NP involved using an Investigation request to ensure that an + action is taken if no response is received. Nothing precludes the + originator of the request from initiating a new TraceRequest + bypassing the NP that denied the request, if a trace is needed beyond + that point. Another option may be for the initiator to send an + Investigation request to an NP upstream of the NP that denied the + request if enough information was gathered to discern the true source + of the attack traffic from the incident handling information. + +4.5.1.1. RID TraceRequest Example + + The example listed is of a TraceRequest based on the incident report + example from the IODEF document. The RID extension classes were + included as appropriate for a TraceRequest message using the + RIDPolicy class. The example given is that of a CSIRT reporting a + DoS attack in progress to the upstream NP. The request asks the next + NP to continue the trace and have the traffic mitigated closer to the + source of the traffic. + + In the following example, use of [XMLsig] to generate digital + signatures does not currently provide digest algorithm agility, as + [XMLsig] only supports SHA-1. A future version of [XMLsig] may + support additional digest algorithms to support digest algorithm + agility. + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="TraceRequest" + MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="IntraConsortium"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.3</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> +</iodef-rid:RID> + + + + + + + +Moriarty Informational [Page 40] + +RFC 6045 RID November 2010 + + +<!-- IODEF-Document accompanied by the above RID --> + +<iodef:IODEF-Document version="1.00" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef:Incident restriction="need-to-know" purpose="traceback"> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + <iodef:DetectTime>2004-02-02T22:49:24+00:00</iodef:DetectTime> + <iodef:StartTime>2004-02-02T22:19:24+00:00</iodef:StartTime> + <iodef:ReportTime>2004-02-02T23:20:24+00:00</iodef:ReportTime> + <iodef:Description>Host involved in DoS attack</iodef:Description> + <iodef:Assessment> + <iodef:Impact severity="low" completion="failed" type="dos"/> + </iodef:Assessment> + <iodef:Contact role="creator" type="organization"> + <iodef:ContactName>Constituency-contact for 192.0.2.35 + </iodef:ContactName> + <iodef:Email>Constituency-contact@192.0.2.35</iodef:Email> + </iodef:Contact> + <iodef:EventData> + <iodef:Flow> + <iodef:System category="source"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.35 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>38765</iodef:port> + </iodef:Service> + </iodef:System> + <iodef:System category="target"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>80</iodef:port> + </iodef:Service> + </iodef:System> + </iodef:Flow> + <iodef:Expectation severity="high" action="rate-limit-host"> + <iodef:Description> + Rate-limit traffic close to source + </iodef:Description> + </iodef:Expectation> + + + + + +Moriarty Informational [Page 41] + +RFC 6045 RID November 2010 + + + <iodef:Record> + <iodef:RecordData> + <iodef:Description> + The IPv4 packet included was used in the described attack + </iodef:Description> + <iodef:RecordItem dtype="ipv4-packet">450000522ad9 + 0000ff06c41fc0a801020a010102976d0050103e020810d9 + 4a1350021000ad6700005468616e6b20796f7520666f7220 + 6361726566756c6c792072656164696e6720746869732052 + 46432e0a + </iodef:RecordItem> + </iodef:RecordData> + </iodef:Record> + </iodef:EventData> + <iodef:History> + <iodef:HistoryItem> + <iodef:DateTime>2001-09-14T08:19:01+00:00</iodef:DateTime> + <iodef:IncidentID name="CSIRT-FOR-OUR-DOMAIN"> + CSIRT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + <iodef:Description> + Notification sent to next upstream NP closer to 192.0.2.35 + </iodef:Description> + </iodef:HistoryItem> + </iodef:History> + </iodef:Incident> +</iodef:IODEF-Document> + + + + + + + + + + + + + + + + + + + + + + + + +Moriarty Informational [Page 42] + +RFC 6045 RID November 2010 + + +<!-- Digital signature accompanied by above RID and IODEF --> + +<Envelope xmlns="urn:envelope" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0" + xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0"> + <iodef:IODEF-Document> + <iodef:Incident> + <iodef:EventData> + <iodef:Record> + <iodef:RecordData> + <iodef:RecordItem type="ipv4-packet">450000522ad9 + 0000ff06c41fc0a801020a010102976d0050103e020810d9 + 4a1350021000ad6700005468616e6b20796f7520666f7220 + 6361726566756c6c792072656164696e6720746869732052 + 46432e0a + </iodef:RecordItem> + </iodef:RecordData> + </iodef:Record> + </iodef:EventData> + </iodef:Incident> + </iodef:IODEF-Document> + <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> + <SignedInfo> + <CanonicalizationMethod + Algorithm="http://www.w3.org/TR/2001/ + REC-xml-c14n-20010315#WithComments"/> + <SignatureMethod + Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"/> + <Reference URI=""> + <Transforms> + <Transform Algorithm= + "http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> + </Transforms> + <DigestMethod + Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/> + <DigestValue>KiI5+6SnFAs429VNwsoJjHPplmo=</DigestValue> + </Reference> + </SignedInfo> + <SignatureValue> + VvyXqCzjoW0m2NdxNeToXQcqcSM80W+JMW+Kn01cS3z3KQwCPeswzg== + </SignatureValue> + + + + + + + + + + +Moriarty Informational [Page 43] + +RFC 6045 RID November 2010 + + + <KeyInfo> + <KeyValue> + <DSAKeyValue> + <P>/KaCzo4Syrom78z3EQ5SbbB4sF7ey80etKII864WF64B81uRpH5t9j + QTxeEu0ImbzRMqzVDZkVG9xD7nN1kuFw==</P> + <Q>li7dzDacuo67Jg7mtqEm2TRuOMU=</Q> + <G>Z4Rxsnqc9E7pGknFFH2xqaryRPBaQ01khpMdLRQnG541Awtx/XPaF5 + Bpsy4pNWMOHCBiNU0NogpsQW5QvnlMpA==</G> + <Y>VFWTD4I/aKni4YhDyYxAJozmj1iAzPLw9Wwd5B+Z9J5E7lHjcAJ+bs + HifTyYdnj+roGzy4o09YntYD8zneQ7lw==</Y> + </DSAKeyValue> + </KeyValue> + </KeyInfo> + </Signature> +</Envelope> + +4.5.1.2. RequestAuthorization Message Example + + The example RequestAuthorization message is in response to the + TraceRequest message listed above. The NP that received the request + is responding to approve the trace continuance in their network. + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="RequestAuthorization" + MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="IntraConsortium"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> + <iodef-rid:RequestStatus AuthorizationStatus="Approved"/> +</iodef-rid:RID> + +4.5.1.3. Result Message Example + + The example Result message is in response to the TraceRequest listed + above. This message type only comes after a RequestAuthorization + within the TraceRequest flow of messages. It may be a direct + response to an Investigation request. This message provides + information about the source of the attack and the actions taken to + mitigate the traffic. + + + + + +Moriarty Informational [Page 44] + +RFC 6045 RID November 2010 + + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="Result" + MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="IntraConsortium"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> + <iodef-rid:IncidentSource> + <iodef-rid:SourceFound>true</iodef-rid:SourceFound> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.37</iodef:Address> + </iodef:Node> + </iodef-rid:IncidentSource> +</iodef-rid:RID> + +<!-- IODEF-Document accompanied by the above RID --> + +<iodef:IODEF-Document version="1.00" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef:Incident restriction="need-to-know" purpose="traceback"> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + <iodef:DetectTime>2004-02-02T22:49:24+00:00</iodef:DetectTime> + <iodef:StartTime>2004-02-02T22:19:24+00:00</iodef:StartTime> + <iodef:ReportTime>2004-02-02T23:20:24+00:00</iodef:ReportTime> + <iodef:Description>Host involved in DoS attack</iodef:Description> + <iodef:Assessment> + <iodef:Impact severity="low" completion="failed" type="dos"/> + </iodef:Assessment> + <iodef:Contact role="creator" type="organization"> + <iodef:ContactName>Constituency-contact for 192.0.2.35 + </iodef:ContactName> + <iodef:Email>Constituency-contact@192.0.2.35</iodef:Email> + </iodef:Contact> + <iodef:EventData> + <iodef:Contact role="admin" type="organization"> + <iodef:ContactName>Admin-contact for 192.0.2.35 + </iodef:ContactName> + <iodef:Email>Admin-contact@10.1.1.2</iodef:Email> + </iodef:Contact> + + + + +Moriarty Informational [Page 45] + +RFC 6045 RID November 2010 + + + <iodef:Flow> + <iodef:System category="intermediate"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.35 + </iodef:Address> + </iodef:Node> + </iodef:System> + </iodef:Flow> + <iodef:EventData> + <iodef:Contact role="admin" type="organization"> + <iodef:ContactName>Admin-contact for 192.0.2.3 + </iodef:ContactName> + <iodef:Email>Admin-contact@192.0.2.3</iodef:Email> + </iodef:Contact> + <iodef:Flow> + <iodef:System category="intermediate"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.3 + </iodef:Address> + </iodef:Node> + </iodef:System> + </iodef:Flow> + </iodef:EventData> + </iodef:EventData> + <iodef:EventData> + <iodef:Flow> + <iodef:System category="source"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.35 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>38765</iodef:port> + </iodef:Service> + </iodef:System> + <iodef:System category="target"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>80</iodef:port> + </iodef:Service> + </iodef:System> + </iodef:Flow> + + + + + + +Moriarty Informational [Page 46] + +RFC 6045 RID November 2010 + + + <iodef:Expectation severity="high" action="rate-limit-host"> + <iodef:Description> + Rate-limit traffic close to source + </iodef:Description> + </iodef:Expectation> + <iodef:Record> + <iodef:RecordData> + <iodef:Description> + The IPv4 packet included was used in the described attack + </iodef:Description> + <iodef:RecordItem dtype="ipv4-packet">450000522ad9 + 0000ff06c41fc0a801020a010102976d0050103e020810d9 + 4a1350021000ad6700005468616e6b20796f7520666f7220 + 6361726566756c6c792072656164696e6720746869732052 + 46432e0a + </iodef:RecordItem> + </iodef:RecordData> + </iodef:Record> + </iodef:EventData> + <iodef:History> + <iodef:HistoryItem> + <iodef:DateTime>2004-02-02T22:53:01+00:00</iodef:DateTime> + <iodef:IncidentID name="CSIRT-FOR-OUR-DOMAIN"> + CSIRT-FOR-OUR-DOMAIN#207-1 + </iodef:IncidentID> + <iodef:Description> + Notification sent to next upstream NP closer to 192.0.2.35 + </iodef:Description> + </iodef:HistoryItem> + <iodef:HistoryItem action="rate-limit-host"> + <iodef:DateTime>2004-02-02T23:07:21+00:00</iodef:DateTime> + <iodef:IncidentID name="CSIRT-FOR-NP3"> + CSIRT-FOR-NP3#3291-1 + </iodef:IncidentID> + <iodef:Description> + Host rate-limited for 24 hours + </iodef:Description> + </iodef:HistoryItem> + </iodef:History> + </iodef:Incident> +</iodef:IODEF-Document> + +4.5.2. Investigation Request Communication Flow + + The diagram below outlines the RID Investigation request + communication flow between RID systems on different networks for a + security incident with a known source address. The proper response + to an Investigation request is a Result message. If there is a + + + +Moriarty Informational [Page 47] + +RFC 6045 RID November 2010 + + + problem with the request, such as a failure to validate the digital + signature or decrypt the request, a RequestAuthorization message is + sent to the requestor. The RequestAuthorization message should + provide the reason why the message could not be processed. + + Attack Dest NP-1 NP-2 Attack Src + + 1. Attack | Attack + reported | detected + + 2. Determine source + of security incident + + 3. o---Investigation----> + + 4. Research + incident and + determine appropriate + actions to take + + 5. <-------Result-------o + + Figure 8. Investigation Communication Flow + +4.5.2.1. Investigation Request Example + + The following example only includes the RID-specific details. The + IODEF and security measures are similar to the TraceRequest + information, with the exception that the source is known and the + receiving RID system is known to be close to the source. The source + known is indicated in the IODEF document, which allows for incident + sources to be listed as spoofed, if appropriate. + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="Investigation" + MsgDestination="SourceOfIncident"> + <iodef-rid:PolicyRegion region="PeerToPeer"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.98</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#208-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> +</iodef-rid:RID> + + + + +Moriarty Informational [Page 48] + +RFC 6045 RID November 2010 + + +<!-- IODEF-Document accompanied by the above RID --> + +<iodef:IODEF-Document version="1.00" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef:Incident restriction="need-to-know" purpose="other"> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#208-1 + </iodef:IncidentID> + <iodef:DetectTime>2004-02-05T08:13:33+00:00</iodef:DetectTime> + <iodef:StartTime>2004-02-05T08:13:31+00:00</iodef:StartTime> + <iodef:EndTime>2004-02-05T08:13:33+00:00</iodef:EndTime> + <iodef:ReportTime>2004-02-05T08:13:35+00:00</iodef:ReportTime> + <iodef:Description>Host involved in DoS attack</iodef:Description> + <iodef:Assessment> + <iodef:Impact severity="low" completion="failed" type="recon"/> + </iodef:Assessment> + <iodef:Contact role="creator" type="organization"> + <iodef:ContactName>Constituency-contact for 192.0.2.35 + </iodef:ContactName> + <iodef:Email>Constituency-contact@10.1.1.2</iodef:Email> + </iodef:Contact> + <iodef:EventData> + <iodef:Flow> + <iodef:System category="source"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.35 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>41421</iodef:port> + </iodef:Service> + </iodef:System> + <iodef:System category="target"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>80</iodef:port> + </iodef:Service> + </iodef:System> + </iodef:Flow> + <iodef:Expectation severity="high" action="investigate"> + <iodef:Description> + Investigate whether source has been compromised + </iodef:Description> + </iodef:Expectation> + </iodef:EventData> + + + +Moriarty Informational [Page 49] + +RFC 6045 RID November 2010 + + + <iodef:History> + <iodef:HistoryItem> + <iodef:DateTime>2004-02-05T08:19:01+00:00</iodef:DateTime> + <iodef:IncidentID name="CSIRT-FOR-OUR-DOMAIN"> + CSIRT-FOR-OUR-DOMAIN#208-1 + </iodef:IncidentID> + <iodef:Description> + Investigation request sent to NP for 192.0.2.35 + </iodef:Description> + </iodef:HistoryItem> + </iodef:History> + </iodef:Incident> +</iodef:IODEF-Document> + +4.5.2.2. RequestAuthorization Message Example + + The example RequestAuthorization message is in response to the + Investigation request listed above. The NP that received the request + was unable to validate the digital signature used to authenticate the + sending RID system. + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="RequestAuthorization" + MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="IntraConsortium"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#208-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> + <iodef-rid:RequestStatus AuthorizationStatus="Denied" + Justification="Authentication"/> +</iodef-rid:RID> + + + + + + + + + + + + + + +Moriarty Informational [Page 50] + +RFC 6045 RID November 2010 + + +4.5.3. Report Communication + + The diagram below outlines the RID Report communication flow between + RID systems on different networks. + + NP-1 NP-2 + + 1. Generate incident information + and prepare Report message + + 2. o-------Report-------> + + 3. File report in database + + Figure 9. Report Communication Flow + + The Report communication flow is used to provide information on + specific incidents detected on the network. Incident information may + be shared between CSIRTs or participating RID hosts using this + format. When a report is received, the RID system must verify that + the report has not already been filed. The incident number and + incident data, such as the hexadecimal packet and incident class + information, can be used to compare with existing database entries. + The Report message typically does not have a response. If there is a + problem with the Report message, such as a failure to validate the + digital signature [RFC3275] or decrypt the request, a + RequestAuthorization message is sent to the requestor. The + RequestAuthorization message should provide the reason why the + message could not be processed. + +4.5.3.1. Report Example + + The following example only includes the RID-specific details. This + report is an unsolicited Report message that includes an IPv4 packet. + The IODEF document and digital signature would be similar to the + TraceRequest information. + + + + + + + + + + + + + + + +Moriarty Informational [Page 51] + +RFC 6045 RID November 2010 + + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="Report" MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="PeerToPeer"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.130</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#209-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> +</iodef-rid:RID> + +<!-- IODEF-Document accompanied by the above RID --> + +<iodef:IODEF-Document version="1.00" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef:Incident restriction="need-to-know" purpose="reporting"> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#209-1 + </iodef:IncidentID> + <iodef:DetectTime>2004-02-05T10:21:08+00:00</iodef:DetectTime> + <iodef:StartTime>2004-02-05T10:21:05+00:00</iodef:StartTime> + <iodef:EndTime>2004-02-05T10:35:00+00:00</iodef:EndTime> + <iodef:ReportTime>2004-02-05T10:27:38+00:00</iodef:ReportTime> + <iodef:Description>Host illicitly accessed admin account + </iodef:Description> + <iodef:Assessment> + <iodef:Impact severity="high" completion="succeeded" + type="admin"/> + <iodef:Confidence rating="high"/> + </iodef:Assessment> + <iodef:Contact role="creator" type="organization"> + <iodef:ContactName>Constituency-contact for 192.0.2.35 + </iodef:ContactName> + <iodef:Email>Constituency-contact@10.1.1.2</iodef:Email> + </iodef:Contact> + <iodef:EventData> + <iodef:Flow> + <iodef:System category="source"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.35 + </iodef:Address> + </iodef:Node> + + + + + + +Moriarty Informational [Page 52] + +RFC 6045 RID November 2010 + + + <iodef:Service> + <iodef:port>32821</iodef:port> + </iodef:Service> + </iodef:System> + <iodef:System category="target"> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.67 + </iodef:Address> + </iodef:Node> + <iodef:Service> + <iodef:port>22</iodef:port> + </iodef:Service> + </iodef:System> + </iodef:Flow> + </iodef:EventData> + <iodef:History> + <iodef:HistoryItem> + <iodef:DateTime>2004-02-05T10:28:00+00:00</iodef:DateTime> + <iodef:IncidentID name="CSIRT-FOR-OUR-DOMAIN"> + CSIRT-FOR-OUR-DOMAIN#209-1 + </iodef:IncidentID> + <iodef:Description> + Incident report sent to NP for 192.0.2.35 + </iodef:Description> + </iodef:HistoryItem> + </iodef:History> + </iodef:Incident> +</iodef:IODEF-Document> + + + + + + + + + + + + + + + + + + + + + + + +Moriarty Informational [Page 53] + +RFC 6045 RID November 2010 + + +4.5.4. IncidentQuery Communication Flow + + The diagram below outlines the RID IncidentQuery communication flow + between RID systems on different networks. + + NP-1 NP-2 + + 1. Generate a request for + information on a specific + incident number or incident type + + 2. o---IncidentQuery---> + + 3. Verify policy information + and determine if matches exist + for requested information + + 4. <-------Report------o + + 5. Associate report to request + by incident number or type + and file report(s). + + Figure 10. IncidentQuery Communication Flow + + The IncidentQuery message communication receives a response of a + Report message. If the Report message is empty, the responding host + did not have information available to share with the requestor. The + incident number and responding RID system, as well as the transport, + assist in the association of the request and response since a report + can be filed and is not always solicited. If there is a problem with + the IncidentQuery message, such as a failure to validate the digital + signature or decrypt the request, a RequestAuthorization message is + sent to the requestor. The RequestAuthorization message should + provide the reason why the message could not be processed. + +4.5.4.1. IncidentQuery Example + + The IncidentQuery request may be received in several formats as a + result of the type of query being performed. If the incident number + is the only information provided, the IODEF document and IP packet + data may not be needed to complete the request. However, if a type + of incident is requested, the incident number remains NULL, and the + + + + + + + + +Moriarty Informational [Page 54] + +RFC 6045 RID November 2010 + + + IP packet data will not be included in the IODEF RecordItem class; + the other incident information is the main source for comparison. In + the case in which an incident number may not be the same between + CSIRTs, the incident number and/or IP packet information can be + provided and used for comparison on the receiving RID system to + generate (a) Report message(s). + +<iodef-rid:RID xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0"> + <iodef-rid:RIDPolicy MsgType="IncidentQuery" + MsgDestination="RIDSystem"> + <iodef-rid:PolicyRegion region="PeerToPeer"/> + <iodef:Node> + <iodef:Address category="ipv4-addr">192.0.2.3</iodef:Address> + </iodef:Node> + <iodef-rid:TrafficType type="Attack"/> + <iodef:IncidentID name="CERT-FOR-OUR-DOMAIN"> + CERT-FOR-OUR-DOMAIN#210-1 + </iodef:IncidentID> + </iodef-rid:RIDPolicy> +</iodef-rid:RID> + +5. RID Schema Definition + +<?xml version="1.0" encoding="UTF-8"?> +<xs:schema xmlns:iodef-rid="urn:ietf:params:xml:ns:iodef-rid-1.0" + xmlns:iodef="urn:ietf:params:xml:ns:iodef-1.0" + xmlns:xs="http://www.w3.org/2001/XMLSchema" + xmlns:ds="http://www.w3.org/2000/09/xmldsig#" + targetNamespace="urn:ietf:params:xml:ns:iodef-rid-1.0" + elementFormDefault="qualified" attributeFormDefault="unqualified"> +<xs:import namespace="urn:ietf:params:xml:ns:iodef-1.0" + schemaLocation="http://www.iana.org/assignments/xml-registry/ + schema/iodef-rid-1.0.xsd"/> + +<xs:import namespace="http://www.w3.org/2000/09/xmldsig#" + schemaLocation= + "http://www.w3.org/TR/xmldsig-core/xmldsig-core-schema.xsd"/> + +<!-- **************************************************************** +********************************************************************* +*** Real-time Inter-network Defense - RID XML Schema *** +*** Namespace - iodef-rid, August 2006 *** +*** The namespace is defined to support transport of IODEF *** +*** documents for exchanging incident information. *** +********************************************************************* +--> + + + + +Moriarty Informational [Page 55] + +RFC 6045 RID November 2010 + + +<!--RID acts as an envelope for IODEF documents to support the exchange + of messages--> +<!-- +====== Real-Time Inter-network Defense - RID ====== +==== Suggested definition for RID messaging ====== + --> + +<xs:annotation> + <xs:documentation>XML Schema wrapper for IODEF</xs:documentation> +</xs:annotation> +<xs:element name="RID" type="iodef-rid:RIDType"/> + <xs:complexType name="RIDType"> + <xs:sequence> + <xs:element ref="iodef-rid:RIDPolicy" minOccurs="0"/> + <xs:element ref="iodef-rid:RequestStatus" minOccurs="0"/> + <xs:element ref="iodef-rid:IncidentSource" minOccurs="0"/> + </xs:sequence> + </xs:complexType> + +<!--Used in RequestAuthorization Message for RID--> + +<xs:element name="RequestStatus" type="iodef-rid:RequestStatusType"/> + <xs:complexType name="RequestStatusType"> + <xs:attribute name="AuthorizationStatus" use="required"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="Approved"/> + <xs:enumeration value="Denied"/> + <xs:enumeration value="Pending"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-AuthorizationStatus" + type="xs:string" use="optional"/> + + + + + + + + + + + + + + + +Moriarty Informational [Page 56] + +RFC 6045 RID November 2010 + + + <xs:attribute name="Justification"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="SystemResource"/> + <xs:enumeration value="Authentication"/> + <xs:enumeration value="AuthenticationOrigin"/> + <xs:enumeration value="Encryption"/> + <xs:enumeration value="Other"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-Justification" + type="xs:string" use="optional"/> + <xs:attribute name="restriction" type="iodef:restriction-type"/> + </xs:complexType> + +<!--Incident Source Information for Result Message--> + +<xs:element name="IncidentSource" type="iodef-rid:IncidentSourceType"/> + <xs:complexType name="IncidentSourceType"> + <xs:sequence> + <xs:element ref="iodef-rid:SourceFound"/> + <xs:element ref="iodef:Node" minOccurs="0" + maxOccurs="unbounded"/> + </xs:sequence> + <xs:attribute name="restriction" type="iodef:restriction-type"/> + </xs:complexType> + <xs:element name="SourceFound" type="xs:boolean"/> + +<!-- +====== Real-Time Inter-network Defense Policy - RIDPolicy ====== +====== Definition for RIDPolicy for messaging + --> + +<xs:annotation> + <xs:documentation>RID Policy used for transport of + messages</xs:documentation> +</xs:annotation> + + + + + + + + + + + +Moriarty Informational [Page 57] + +RFC 6045 RID November 2010 + + +<!-- RIDPolicy information with setting information listed in RID + documentation --> + +<xs:element name="RIDPolicy" type="iodef-rid:RIDPolicyType"/> + <xs:complexType name="RIDPolicyType"> + <xs:sequence> + <xs:element ref="iodef-rid:PolicyRegion" maxOccurs="unbounded"/> + <xs:element ref="iodef:Node"/> + <xs:element ref="iodef-rid:TrafficType" maxOccurs="unbounded"/> + <xs:element ref="iodef:IncidentID" minOccurs="0"/> + </xs:sequence> + <xs:attribute name="MsgType" use="required"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="TraceRequest"/> + <xs:enumeration value="RequestAuthorization"/> + <xs:enumeration value="Result"/> + <xs:enumeration value="Investigation"/> + <xs:enumeration value="Report"/> + <xs:enumeration value="IncidentQuery"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-MsgType" type="xs:string" use="optional"/> + <xs:attribute name="MsgDestination" use="required"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="RIDSystem"/> + <xs:enumeration value="SourceOfIncident"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-MsgDestination" type="xs:string" + use="optional"/> + </xs:complexType> + + + + + + + + + + + + +Moriarty Informational [Page 58] + +RFC 6045 RID November 2010 + + + <xs:element name="PolicyRegion"> + <xs:complexType> + <xs:attribute name="region" use="required"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="ClientToNP"/> + <xs:enumeration value="NPToClient"/> + <xs:enumeration value="IntraConsortium"/> + <xs:enumeration value="PeerToPeer"/> + <xs:enumeration value="BetweenConsortiums"/> + <xs:enumeration value="AcrossNationalBoundaries"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-region" + type="xs:string" use="optional"/> + </xs:complexType> + </xs:element> + <xs:element name="TrafficType" default="Attack"> + <xs:complexType> + <xs:attribute name="type" use="required"> + <xs:simpleType> + <xs:restriction base="xs:NMTOKEN"> + <xs:whiteSpace value="collapse"/> + <xs:enumeration value="Attack"/> + <xs:enumeration value="Network"/> + <xs:enumeration value="Content"/> + <xs:enumeration value="OfficialBusiness"/> + <xs:enumeration value="Other"/> + <xs:enumeration value="ext-value"/> + </xs:restriction> + </xs:simpleType> + </xs:attribute> + <xs:attribute name="ext-type" + type="xs:string" use="optional"/> + </xs:complexType> + </xs:element> +</xs:schema> + + + + + + + + + + + +Moriarty Informational [Page 59] + +RFC 6045 RID November 2010 + + +6. Security Considerations + + Communication between NPs' RID systems must be protected. RID has + many security considerations built into the design of the protocol, + several of which are described in the following sub-sections. For a + complete view of security, considerations need to include the + availability, confidentiality, and integrity concerns for the + transport, storage, and exchange of information. + + When considering the transport of RID messages, an out-of-band + network, either logical or physical, would prevent outside attacks + against RID communication. An out-of-band connection would be ideal, + but not necessarily practical. Authenticated encrypted tunnels + between RID systems MUST be used to provide confidentiality, + integrity, authenticity, and privacy for the data. Trust + relationships are based on consortiums and established trust + relationships of public key infrastructure (PKI) cross-certifications + of consortiums. By using RIDPolicy information, TLS, and the XML + security features of encryption [XMLencrypt] and digital signatures + [RFC3275], [XMLsig], RID takes advantage of existing security + standards. The standards provide clear methods to ensure that + messages are secure, authenticated, and authorized, and that the + messages meet policy and privacy guidelines and maintain integrity. + + As specified in the relevant sections of this document, the XML + digital signature [RFC3275] and XML encryption [XMLencrypt] are used + in the following cases: + + XML Digital Signature + + o The originator of the TraceRequest or Investigation request MUST + use a detached signature to sign at least one of the original IP + packets included in the RecordItem class data to provide + authentication to all upstream participants in the trace of the + origin. All IP packets provided by the originator may be signed, + and additional packets added by upstream peers in the trace may be + signed by the peer adding the data, while maintaining the IP + packet and detached signature from the original requestor. This + signature MUST be passed to all recipients of the TraceRequest. + + o For all message types, the full IODEF/RID document MUST be signed + using an enveloped signature by the sending peer to provide + authentication and integrity to the receiving RID system. + + + + + + + + +Moriarty Informational [Page 60] + +RFC 6045 RID November 2010 + + + XML Encryption + + o The IODEF/RID document may be encrypted to provide an extra layer + of security between peers so that the message is not only + encrypted for the transport, but also while stored. This behavior + would be agreed upon between peers or a consortium, or determined + on a per-message basis, depending on security requirements. It + should be noted that there are cases for transport where the + RIDPolicy class needs to be presented in clear text, as detailed + in the transport document [RFC6046]. + + o An Investigation request, or any other message type that may be + relayed through RID systems other than the intended destination as + a result of trust relationships, may be encrypted for the intended + recipient. This may be necessary if the RID network is being used + for message transfer, the intermediate parties do not need to have + knowledge of the request contents, and a direct communication path + does not exist. In that case, the RIDPolicy class is used by + intermediate parties and is maintained in clear text. + + o The action taken in the Result message may be encrypted using the + key of the request originator. In that case, the intermediate + parties can view the RIDPolicy information and know the trace has + been completed and do not need to see the action. If the use of + encryption were limited to sections of the message, the History + class information would be encrypted. Otherwise, it is + RECOMMENDED to encrypt the entire IODEF/RID document, using an + enveloped signature, for the originator of the request. The + existence of the Result message for an incident would tell any + intermediate parties used in the path of the incident + investigation that the incident handling has been completed. + + The formation of policies is a very important aspect of using a + messaging system like RID to exchange potentially sensitive + information. Many considerations should be involved for peering + parties, and some guidelines to protect the data, systems, and + transport are covered in this section. Policies established should + provide guidelines for communication methods, security, and fall-back + procedures. + + The security considerations for the storage and exchange of + information in RID messaging may include adherence to local, + regional, or national regulations in addition to the obligations to + protect client information during an investigation. RID Policy is a + necessary tool for listing the requirements of messages to provide a + method to categorize data elements for proper handling. Controls are + also provided for the sending entity to protect messages from third + parties through XML encryption. + + + +Moriarty Informational [Page 61] + +RFC 6045 RID November 2010 + + + RID provides a method to exchange incident handling request and + Report messages to peer networks. Network administrators, who have + the ability to base the decision on the available resources and other + factors of their network, maintain control of incident investigations + within their own network. Thus, RID provides the ability for + participating networks to manage their own security controls, + leveraging the information listed in RIDPolicy. + +6.1. Message Transport + + The transport specifications are fully defined in a separate document + [RFC6046]. The specified transport protocols MUST use encryption to + provide an additional level of security and integrity, while + supporting mutual authentication through bi-directional certificate + usage. Any subsequent transport method defined should take advantage + of existing standards for ease of implementation and integration of + RID systems. Session encryption for the transport of RID messages is + enforced in the transport specification. The privacy and security + considerations are addressed fully in RID to protect sensitive + portions of documents and provide a method to authenticate the + messages. Therefore, RID messages do not rely on the security + provided by the transport layer alone. The encryption requirements + and considerations for RID are discussed at the beginning of + Section 6 of this document. + + XML security functions such as the digital signature [RFC3275] and + encryption [XMLencrypt] provide a standards-based method to encrypt + and digitally sign RID messages. RID messages specify system use and + privacy guidelines through the RIDPolicy class. A public key + infrastructure (PKI) provides the base for authentication and + authorization, encryption, and digital signatures to establish trust + relationships between members of a RID consortium or a peering + consortium. + + XML security functions such as the digital signature [RFC3275] and + encryption [XMLencrypt] can be used within the contents of the + message for privacy and security in cases for which certain elements + must remain encrypted or signed as they traverse the path of a trace. + For example, the digital signature on a TraceRequest can be used to + verify the identity of the trace originator. The use of the XML + security features in RID messaging is in accordance with the + specifications for the IODEF model; however, the use requirements may + differ since RID also incorporates communication of security incident + information. + + + + + + + +Moriarty Informational [Page 62] + +RFC 6045 RID November 2010 + + +6.2. Message Delivery Protocol - Integrity and Authentication + + The RID protocol must be able to guarantee delivery and meet the + necessary security requirements of a state-of-the-art protocol. In + order to guarantee delivery, TCP should be considered as the + underlying protocol within the current network standard practices. + + Security considerations must include the integrity, authentication, + privacy, and authorization of the messages sent between RID + communication systems or IHSs. The communication between RID systems + must be authenticated and encrypted to ensure the integrity of the + messages and the RID systems involved in the trace. Another concern + that needs to be addressed is authentication for a request that + traverses multiple networks. In this scenario, systems in the path + of the multi-hop TraceRequest need to authorize a trace from not only + their neighbor network, but also from the initiating RID system as + discussed in Section 6.4. Several methods can be used to ensure + integrity and privacy of the communication. + + The transport mechanism selected MUST follow the defined transport + protocol [RFC6046] when using RID messaging to ensure consistency + among the peers. Consortiums may vary their selected transport + mechanisms and thus must decide upon a mutual protocol to use for + transport when communicating with peers in a neighboring consortium + using RID. RID systems MUST implement and deploy HTTPS as defined in + the transport document [RFC6046] and optionally support other + protocols such as the Blocks Extensible Exchange Protocol (BEEP). + RID, the XML security functions, and transport protocols must + properly integrate with a public key infrastructure (PKI) managed by + the consortium or one managed by a trusted entity. For the Internet, + an example of an existing effort that could be leveraged to provide + the supporting PKI could be the American Registry for Internet + Numbers (ARIN) and the Regional Internet Registry's (RIR's) PKI + hierarchy. Security and privacy considerations related to + consortiums are discussed in Sections 6.5 and 6.6. + +6.3. Transport Communication + + Out-of-band communications dedicated to NP interaction for RID + messaging would provide additional security as well as guaranteed + bandwidth during a denial-of-service attack. For example, an out-of- + band channel may consist of logical paths defined over the existing + network. Out-of-band communications may not be possible between all + network providers, but should be considered to protect the network + management systems used for RID messaging. Methods to protect the + data transport may also be provided through session encryption. + + + + + +Moriarty Informational [Page 63] + +RFC 6045 RID November 2010 + + + In order to address the integrity and authenticity of messages, + transport encryption MUST be used to secure the traffic sent between + RID systems. Systems with predefined relationships for RID would + include those who peer within a consortium with agreed-upon + appropriate use regulations and for peering consortiums. Trust + relationships may also be defined through a bridged or hierarchical + PKI in which both peers belong. + + Systems used to send authenticated RID messages between networks MUST + use a secured system and interface to connect to a border network's + RID systems. Each connection to a RID system MUST meet the security + requirements agreed upon through the consortium regulations, peering, + or SLAs. The RID system MUST only listen for and send RID messages + on the designated port, which also MUST be over an encrypted tunnel + meeting the minimum requirement of algorithms and key lengths + established by the consortium, peering, or SLA. The selected + cryptographic algorithms for symmetric encryption, digital + signatures, and hash functions MUST meet minimum security levels of + the times. The encryption strength MUST adhere to import and export + regulations of the involved countries for data exchange. + +6.4. Authentication of RID Protocol + + In order to ensure the authenticity of the RID messages, a message + authentication scheme is used to secure the protocol. XML security + functions utilized in RID require a trust center such as a PKI for + the distribution of credentials to provide the necessary level of + security for this protocol. Layered transport protocols also utilize + encryption and rely on a trust center. Public key certificate pairs + issued by a trusted Certification Authority (CA) MAY be used to + provide the necessary level of authentication and encryption for the + RID protocol. The CA used for RID messaging must be trusted by all + involved parties and may take advantage of similar efforts, such as + the Internet2 federated PKI or the ARIN/RIR effort to provide a PKI + to network providers. The PKI used for authentication would also + provide the necessary certificates needed for encryption used for the + RID transport protocol [RFC6046]. + + The use of pre-shared keys may be considered for authentication. If + this option is selected, the specifications set forth in "Pre-Shared + Key Ciphersuites for Transport Layer Security (TLS)" [RFC4279] MUST + be followed. + + Hosts receiving a RID message MUST be able to verify that the sender + of the request is valid and trusted. Using digital signatures on a + hash of the RID message with an X.509 version 3 certificate issued by + a trusted party MUST be used to authenticate the request. The X.509 + version 3 specifications as well as the digital signature + + + +Moriarty Informational [Page 64] + +RFC 6045 RID November 2010 + + + specifications and path validation standards set forth in [RFC5280] + MUST be followed in order to interoperate with a PKI designed for + similar purposes. The IODEF specification MUST be followed for + digital signatures to provide the authentication and integrity + aspects required for secure messaging between network providers. The + use of digital signatures in RID XML messages MUST follow the World + Wide Web Consortium (W3C) recommendations for signature syntax and + processing when either the XML encryption [XMLencrypt] or digital + signature [XMLsig], [RFC3275] is used within a document. Transport + specifications are detailed in a separate document [RFC6046]. + + It might be helpful to define an extension to the authentication + scheme that uses attribute certificates [RFC5755] in such a way that + an application could automatically determine whether human + intervention is needed to authorize a request; however, the + specification of such an extension is out of scope for this document. + +6.4.1. Multi-Hop TraceRequest Authentication + + Bilateral trust relations between network providers ensure the + authenticity of requests for TraceRequests from immediate peers in + the web of networks formed to provide the traceback capability. A + network provider several hops into the path of the RID trace must + trust the information from its own trust relationships as well as the + previous trust relationships in the downstream path. For practical + reasons, the NPs may want to prioritize incident handling events + based upon the immediate peer for a TraceRequest, the originator, and + the listed Confidence rating for the incident. In order to provide a + higher assurance level of the authenticity of the TraceRequest, the + originating RID system is included in the TraceRequest along with + contact information and the information of all RID systems in the + path the trace has taken. This information is provided through the + IODEF EventData class nesting the list of systems and contacts + involved in a trace, while setting the category attribute to + "infrastructure". + + A second measure MUST be taken to ensure the identity of the + originating RID system. The originating RID system MUST include a + digital signature in the TraceRequest sent to all systems in the + upstream path. The digital signature from the RID system is + performed on the RecordItem class of the IODEF following the XML + digital signature specifications from W3C [XMLsig] using a detached + signature. The signature MUST be passed to all parties that receive + a TraceRequest, and each party MUST be able to perform full path + validation on the digital signature. Full path validation verifies + the chaining relationship to a trusted root and also performs a + certificate revocation check. In order to accommodate that + requirement, the IP packet in the RecordItem data MUST remain + + + +Moriarty Informational [Page 65] + +RFC 6045 RID November 2010 + + + unchanged as a request is passed along between providers and is the + only element for which the signature is applied. If additional + packets are included in the document at upstream peers, the initial + packet MUST still remain with the detached signature. The subsequent + packets may be signed by the peer adding the incident information for + the investigation. A second benefit to this requirement is that the + integrity of the filter used is ensured as it is passed to subsequent + NPs in the upstream trace of the packet. The trusted PKI also + provides the keys used to digitally sign the RecordItem class for + TraceRequests to meet the requirement of authenticating the original + request. Any host in the path of the trace should be able to verify + the digital signature using the trusted PKI. + + In the case in which an enterprise network using RID sends a + TraceRequest to its provider, the signature from the enterprise + network MUST be included in the initial request. The NP may generate + a new request to send upstream to members of the NP consortium to + continue the trace. If the original request is sent, the originating + NP, acting on behalf of the enterprise network under attack, MUST + also digitally sign, with an enveloped signature, the full IODEF + document to assure the authenticity of the TraceRequest. An NP that + offers RID as a service may be using its own PKI to secure RID + communications between its RID system and the attached enterprise + networks. NPs participating in the trace MUST be able to determine + the authenticity of RID requests. + +6.5. Consortiums and Public Key Infrastructures + + Consortiums of NPs are an ideal way to establish a communication web + of trust for RID messaging. The consortium could provide centralized + resources, such as a PKI, and established guidelines for use of the + RID protocol. The consortium would also assist in establishing trust + relationships between the participating NPs to achieve the necessary + level of cooperation and experience-sharing among the consortium + entities. This may be established through PKI certificate policy + [RFC3647] reviews to determine the appropriate trust levels between + organizations or entities. The consortium may also be used for other + purposes to better facilitate communication among NPs in a common + area (Internet, region, government, education, private networks, + etc.). + + Using a PKI to distribute certificates used by RID systems provides + an already established method to link trust relationships between NPs + of consortiums that would peer with NPs belonging to a separate + consortium. In other words, consortiums could peer with other + consortiums to enable communication of RID messages between the + + + + + +Moriarty Informational [Page 66] + +RFC 6045 RID November 2010 + + + participating NPs. The PKI along with Memorandums of Agreement could + be used to link border directories to share public key information in + a bridge, a hierarchy, or a single cross-certification relationship. + + Consortiums also need to establish guidelines for each participating + NP to adhere to. The RECOMMENDED guidelines include: + + o Physical and logical practices to protect RID systems; + + o Network and application layer protection for RID systems and + communications; + + o Proper use guidelines for RID systems, messages, and requests; and + + o A PKI to provide authentication, integrity, and privacy. + + The functions described for a consortium's role would parallel that + of a PKI federation. The PKI federations that currently exist are + responsible for establishing security guidelines and PKI trust + models. The trust models are used to support applications to share + information using trusted methods and protocols. + + A PKI can also provide the same level of security for communication + between an end entity (enterprise, educational, or government + customer network) and the NP. The PKI may be a subordinate CA or in + the CA hierarchy from the NP's consortium to establish the trust + relationships necessary as the request is made to other connected + networks. + +6.6. Privacy Concerns and System Use Guidelines + + Privacy issues raise many concerns when information-sharing is + required to achieve the goal of stopping or mitigating the effects of + a security incident. The RIDPolicy class is used to automate the + enforcement of the privacy concerns listed within this document. The + privacy and system use concerns that MUST be addressed in the RID + system and other integrated components include the following: + + Network Provider Concerns: + + o Privacy of data monitored and/or stored on IDSs for attack + detection. + + o Privacy of data monitored and stored on systems used to trace + traffic across a single network. + + + + + + +Moriarty Informational [Page 67] + +RFC 6045 RID November 2010 + + + Customer Attached Networks Participating in RID with NP: + + o Customer networks may include an enterprise, educational, + government, or other attached networks to an NP participating in + RID and MUST be made fully aware of the security and privacy + considerations for using RID. + + o Customers MUST know the security and privacy considerations in + place by their NP and the consortium of which the NP is a member. + + o Customers MUST understand that their data can and will be sent to + other NPs in order to complete a trace unless an agreement stating + otherwise is made in the service level agreements between the + customer and NP. + + Parties Involved in the Attack: + + o Privacy of the identity of a host involved in an attack. + + o Privacy of information such as the source and destination used for + communication purposes over the monitored or RID connected + network(s). + + o Protection of data from being viewed by intermediate parties in + the path of an Investigation request MUST be considered. + + Consortium Considerations: + + o System use restricted to security incident handling within the + local region's definitions of appropriate traffic for the network + monitored and linked via RID in a single consortium also abiding + by the consortium's use guidelines. + + o System use prohibiting the consortium's participating NPs from + inappropriately tracing non-attack traffic to locate sources or + mitigate traffic unlawfully within the jurisdiction or region. + + Inter-Consortium Considerations: + + o System use between peering consortiums MUST also adhere to any + government communication regulations that apply between those two + regions, such as encryption export and import restrictions. This + may include consortiums that are categorized as + "BetweenConsortiums" or "AcrossNationalBoundaries". + + o System use between consortiums MUST NOT request traffic traces and + actions beyond the scope intended and permitted by law or + inter-consortium agreements. + + + +Moriarty Informational [Page 68] + +RFC 6045 RID November 2010 + + + o System use between consortiums classified as + "AcrossNationalBoundaries" MUST respect national boundary issues + and limit requests to appropriate system use and not to achieve + their own agenda to limit or restrict traffic that is otherwise + permitted within the country in which the peering consortium + resides. + + The security and privacy considerations listed above are for the + consortiums, NPs, and enterprises to agree upon. The agreed-upon + policies may be facilitated through use of the RIDPolicy class. Some + privacy considerations are addressed through the RID guidelines for + encryption and digital signatures as described at the beginning of + Section 6. + + RID is useful in determining the true source of a packet that + traverses multiple networks or to communicate security incidents and + automate the response. The information obtained from the trace may + determine the identity of the source host or the network provider + used by the source of the traffic. It should be noted that the trace + mechanism used across a single-network provider may also raise + privacy concerns for the clients of the network. Methods that may + raise concern include those that involve storing packets for some + length of time in order to trace packets after the fact. Monitoring + networks for intrusions and for tracing capabilities also raises + concerns for potentially sensitive valid traffic that may be + traversing the monitored network. IDSs and single-network tracing + are outside of the scope of this document, but the concern should be + noted and addressed within the use guidelines of the network. Some + IDSs and single-network trace mechanisms attempt to properly address + these issues. RID is designed to provide the information needed by + any single-network trace mechanism. The provider's choice of a + single trace mechanism depends on resources, existing solutions, and + local legislation. Privacy concerns in regard to the single-network + trace must be dealt with at the client-to-NP level and are out of + scope for RID messaging. + + The identity of the true source of an attack packet being traced + through RID could be sensitive. The true identity listed in a Result + message can be protected through the use of encryption [XMLencrypt] + enveloping the IODEF document and RID Result information, using the + public encryption key of the originating NP. Alternatively, the + action taken may be listed without the identity being revealed to the + originating NP. The ultimate goal of the RID communication system is + to stop or mitigate attack traffic, not to ensure that the identity + of the attack traffic is known to involved parties. The NP that + identifies the source should deal directly with the involved parties + and proper authorities in order to determine the guidelines for the + release of such information, if it is regarded as sensitive. In some + + + +Moriarty Informational [Page 69] + +RFC 6045 RID November 2010 + + + situations, systems used in attacks are compromised by an unknown + source and, in turn, are used to attack other systems. In that + situation, the reputation of a business or organization may be at + stake, and the action taken may be the only additional information + reported in the Result message to the originating system. If the + security incident is a minor incident, such as a zombie system used + in part of a large-scale DDoS attack, ensuring the system is taken + off the network until it has been fixed may be sufficient. The + decision is left to the system users and consortiums to determine + appropriate data to be shared given that the goal of the + specification is to provide the appropriate technical options to + remain compliant. The textual descriptions should include details of + the incident in order to protect the reputation of the unknowing + attacker and prevent the need for additional investigation. Local, + state, or national laws may dictate the appropriate reporting action + for specific security incidents. + + Privacy becomes an issue whenever sensitive data traverses a network. + For example, if an attack occurred between a specific source and + destination, then every network provider in the path of the trace + would become aware that the cyber attack occurred. In a targeted + attack, it may not be desirable that information about two nation + states that are battling a cyber war would become general knowledge + to all intermediate parties. However, it is important to allow the + traces to take place in order to halt the activity since the health + of the networks in the path could also be at stake during the attack. + This provides a second argument for allowing the Result message to + only include an action taken and not the identity of the offending + host. In the case of an Investigation request, where the originating + NP is aware of the NP that will receive the request for processing, + the free-form text areas of the document could be encrypted + [XMLencrypt] using the public key of the destination NP to ensure + that no other NP in the path can read the contents. The encryption + would be accomplished through the W3C [XMLencrypt] specification for + encrypting an element. + + In some situations, all network traffic of a nation may be granted + through a single network provider. In that situation, options must + support sending Result messages from a downstream peer of that + network provider. That option provides an additional level of + abstraction to hide the identity and the NP of the identified source + of the traffic. Legal action may override this technical decision + after the trace has taken place, but that is out of the technical + scope of this document. + + Privacy concerns when using an Investigation request to request + action close to the source of valid attack traffic needs to be + considered. Although the intermediate NPs may relay the request if + + + +Moriarty Informational [Page 70] + +RFC 6045 RID November 2010 + + + there is no direct trust relationship to the closest NP to the + source, the intermediate NPs do not require the ability to see the + contents of the packet or the text description field(s) in the + request. This message type does not require any action by the + intermediate RID systems, except to relay the packet to the next NP + in the path. Therefore, the contents of the request may be encrypted + for the destination system. The intermediate NPs would only need to + know how to direct the request to the manager of the ASN in which the + source IP address belongs. + + Traces must be legitimate security-related incidents and not used for + purposes such as sabotage or censorship. An example of such abuse of + the system would include a request to block or rate-limit legitimate + traffic to prevent information from being shared between users on the + Internet (restricting access to online versions of papers) or + restricting access from a competitor's product in order to sabotage a + business. + + Intra-consortium RID communications raise additional issues, + especially when the peering consortiums reside in different regions + or nations. TraceRequests and requested actions to mitigate traffic + must adhere to the appropriate use guidelines and yet prevent abuse + of the system. First, the peering consortiums MUST identify the + types of traffic that can be traced between the borders of the + participating NPs of each consortium. The traffic traced should be + limited to security-incident-related traffic. Second, the traces + permitted within one consortium if passed to a peering consortium may + infringe upon the peering consortium's freedom of information laws. + An example would be a consortium in one country permitting a trace of + traffic containing objectionable material, outlawed within that + country. The RID trace may be a valid use of the system within the + confines of that country's network border; however, it may not be + permitted to continue across network boundaries where such content is + permitted under law. By continuing the trace in another country's + network, the trace and response could have the effect of improperly + restricting access to data. A continued trace into a second country + may break the laws and regulations of that nation. Any such traces + MUST cease at the country's border. + + The privacy concerns listed in this section address issues among the + trusted parties involved in a trace within an NP, a RID consortium, + and peering RID consortiums. Data used for RID communications must + also be protected from parties that are not trusted. This protection + is provided through the authentication and encryption of documents as + they traverse the path of trusted servers. Each RID system MUST + perform a bi-directional authentication when sending a RID message + and use the public encryption key of the upstream or downstream peer + to send a message or document over the network. This means that the + + + +Moriarty Informational [Page 71] + +RFC 6045 RID November 2010 + + + document is decrypted and re-encrypted at each RID system via TLS + over the transport protocol [RFC6046]. The RID messages may be + decrypted at each RID system in order to properly process the request + or relay the information. Today's processing power is more than + sufficient to handle the minimal burden of encrypting and decrypting + relatively small typical RID messages. + +7. IANA Considerations + + This document uses URNs to describe XML namespaces and XML schemas + [XMLschema] conforming to a registry mechanism described in + [RFC3688]. + + Registration request for the iodef-rid namespace: + + URI: urn:ietf:params:xml:ns:iodef-rid-1.0 + + Registrant Contact: See the "Author's Address" section of this + document. + + XML: None. Namespace URIs do not represent an XML specification. + + + Registration request for the iodef-rid XML schema: + + URI: urn:ietf:params:xml:schema:iodef-rid-1.0 + + Registrant Contact: See the "Author's Address" section of this + document. + + XML: See Section 5, "RID Schema Definition", of this document. + +8. Summary + + Security incidents have always been difficult to trace as a result of + the spoofed sources, resource limitations, and bandwidth utilization + problems. Incident response is often slow even when the IP address + is known to be valid because of the resources required to notify the + responsible party of the attack and then to stop or mitigate the + attack traffic. Methods to identify and trace attacks near real time + are essential to thwarting attack attempts. Network providers need + policies and automated methods to combat the hacker's efforts. NPs + need automated monitoring and response capabilities to identify and + trace attacks quickly without resource-intensive side effects. + Integration with a centralized communication system to coordinate the + detection, tracing, and identification of attack sources on a single + network is essential. RID provides a way to integrate NP resources + for each aspect of attack detection, tracing, and source + + + +Moriarty Informational [Page 72] + +RFC 6045 RID November 2010 + + + identification and extends the communication capabilities among + network providers. The communication is accomplished through the use + of flexible IODEF XML-based documents passed between IHSs or RID + systems. A TraceRequest or Investigation request is communicated to + an upstream NP and may result in an upstream trace or in an action to + stop or mitigate the attack traffic. The messages are communicated + among peers with security inherent to the RID messaging scheme + provided through existing standards such as XML encryption and + digital signatures. Policy information is carried in the RID message + itself through the use of the RIDPolicy. RID provides the timely + communication among NPs, which is essential for incident handling. + +9. References + +9.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3275] Eastlake 3rd, D., Reagle, J., and D. Solo, + "(Extensible Markup Language) XML-Signature Syntax and + Processing", RFC 3275, March 2002. + + [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC + 3688, January 2004. + + [RFC4279] Eronen, P., Ed., and H. Tschofenig, Ed., "Pre-Shared + Key Ciphersuites for Transport Layer Security (TLS)", + RFC 4279, December 2005. + + [RFC5070] Danyliw, R., Meijer, J., and Y. Demchenko, "The + Incident Object Description Exchange Format", RFC + 5070, December 2007. + + [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., + Housley, R., and W. Polk, "Internet X.509 Public Key + Infrastructure Certificate and Certificate Revocation + List (CRL) Profile", RFC 5280, May 2008. + + [RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet + Attribute Certificate Profile for Authorization", + RFC 5755, January 2010. + + [RFC6046] Moriarty, K. and B. Trammell, "Transport of Real-Time + Inter-Network Defense (RID) Messages," RFC 6046, + November 2010. + + + + + +Moriarty Informational [Page 73] + +RFC 6045 RID November 2010 + + + [XML1.0] "Extensible Markup Language (XML) 1.0 (Second + Edition)". W3C Recommendation. T. Bray, E. Maler, J. + Paoli, and C.M. Sperberg-McQueen. October 2000. + http://www.w3.org/TR/2000/REC-xml-20001006. + + [XMLnames] "Namespaces in XML 1.0 (Third Edition)". W3C + Recommendation. T. Bray, D. Hollander, A. Layman, R. + Tobin, H. Thompson. December 2009. + http://www.w3.org/TR/REC-xml-names/. + + [XMLencrypt] "XML Encryption Syntax and Processing". W3C + Recommendation. T. Imamura, B. Dillaway, and E. + Simon. December 2002. + http://www.w3.org/TR/xmlenc-core/. + + [XMLschema] "XML Schema". E. Van der Vlist. O'Reilly. 2002. + + [XMLsig] "XML-Signature Syntax and Processing (Second + Edition)". W3C Recommendation. M. Bartel, J. Boyer, + B. Fox, B. LaMacchia, and E. Simon. June 2008. + http://www.w3.org/TR/xmldsig-core/#sec-Design. + +9.2. Informative References + + [RFC1930] Hawkinson, J. and T. Bates, "Guidelines for creation, + selection, and registration of an Autonomous System + (AS)", BCP 6, RFC 1930, March 1996. + + [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: + Defeating Denial of Service Attacks which employ IP + Source Address Spoofing", BCP 38, RFC 2827, May 2000. + + [RFC3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and + S. Wu, "Internet X.509 Public Key Infrastructure + Certificate Policy and Certification Practices + Framework", RFC 3647, November 2003. + + [RFC3917] Quittek, J., Zseby, T., Claise, B., and S. Zander, + "Requirements for IP Flow Information Export (IPFIX)", + RFC 3917, October 2004. + + [RFC5735] Cotton, M. and L. Vegoda, "Special Use IPv4 + Addresses", BCP 153, RFC 5735, January 2010. + + [IPtrace] "Advanced and Authenticated Marking Schemes for IP + Traceback". D. Song and A. Perrig. IEEE INFOCOM + 2001. + + + + +Moriarty Informational [Page 74] + +RFC 6045 RID November 2010 + + + [HASH-IPtrace] "Hash-Based IP Traceback". A. Snoeren, C. Partridge, + L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. + Strayer. SIGCOMM'01. August 2001. + + [ICMPtrace] Bellovin, S., Leech, M., and T. Taylor, "ICMP + Traceback Messages", Work in Progress, February 2003. + + [NTWK-IPtrace] "Practical network support for IP traceback". S. + Savage, D. Wetherall, A. Karlin, and T. Anderson. + SIGCOMM'00. August 2000. + + [DoS] "Trends in Denial of Service Attack Technology". K. + Houle, G. Weaver, N. Long, and R. Thomas. CERT + Coordination Center. October 2001. + +Acknowledgements + + Many thanks to coworkers and the Internet community for reviewing and + commenting on the document as well as providing recommendations to + simplify and secure the protocol: Robert K. Cunningham, Ph.D, Cynthia + D. McLain, Dr. William Streilein, Iljitsch van Beijnum, Steve + Bellovin, Yuri Demchenko, Jean-Francois Morfin, Stephen Northcutt, + Jeffrey Schiller, Brian Trammell, Roman Danyliw, Tony Tauber, and + Sandra G. Dykes, Ph.D. + +Sponsor Information + + This work was sponsored by the Air Force under Air Force Contract + FA8721-05-C-0002, while working at MIT Lincoln Laboratory. + + "Opinions, interpretations, conclusions, and recommendations are + those of the author and are not necessarily endorsed by the United + States Government". + +Author's Address + + Kathleen M. Moriarty + RSA, The Security Division of EMC + 174 Middlesex Turnpike + Bedford, MA 01730 + US + + EMail: Moriarty_Kathleen@EMC.com + + + + + + + + +Moriarty Informational [Page 75] + |