diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6398.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6398.txt')
-rw-r--r-- | doc/rfc/rfc6398.txt | 1067 |
1 files changed, 1067 insertions, 0 deletions
diff --git a/doc/rfc/rfc6398.txt b/doc/rfc/rfc6398.txt new file mode 100644 index 0000000..eab46a8 --- /dev/null +++ b/doc/rfc/rfc6398.txt @@ -0,0 +1,1067 @@ + + + + + + +Internet Engineering Task Force (IETF) F. Le Faucheur, Ed. +Request for Comments: 6398 Cisco +BCP: 168 October 2011 +Updates: 2113, 2711 +Category: Best Current Practice +ISSN: 2070-1721 + + + IP Router Alert Considerations and Usage + +Abstract + + The IP Router Alert Option is an IP option that alerts transit + routers to more closely examine the contents of an IP packet. The + Resource reSerVation Protocol (RSVP), Pragmatic General Multicast + (PGM), the Internet Group Management Protocol (IGMP), Multicast + Listener Discovery (MLD), Multicast Router Discovery (MRD), and + General Internet Signaling Transport (GIST) are some of the protocols + that make use of the IP Router Alert Option. This document discusses + security aspects and usage guidelines around the use of the current + IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. + Specifically, it provides recommendations against using the Router + Alert in the end-to-end open Internet and identifies controlled + environments where protocols depending on Router Alert can be used + safely. It also provides recommendations about protection approaches + for service providers. Finally, it provides brief guidelines for + Router Alert implementation on routers. + +Status of This Memo + + This memo documents an Internet Best Current Practice. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + BCPs is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6398. + + + + + + + + + + +Le Faucheur Best Current Practice [Page 1] + +RFC 6398 Router Alert Considerations October 2011 + + +Copyright Notice + + Copyright (c) 2011 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Terminology .....................................................4 + 2.1. Conventions Used in This Document ..........................4 + 3. Security Concerns of Router Alert ...............................5 + 4. Guidelines for Use of Router Alert ..............................7 + 4.1. Use of Router Alert End to End in the Internet + (Router Alert in Peer Model) ...............................7 + 4.2. Use of Router Alert in Controlled Environments .............9 + 4.2.1. Use of Router Alert within an Administrative + Domain ..............................................9 + 4.2.2. Use of Router Alert in Overlay Model ...............11 + 4.3. Router Alert Protection Approaches for Service Providers ..13 + 5. Guidelines for Router Alert Implementation .....................15 + 6. Security Considerations ........................................16 + 7. Contributors ...................................................16 + 8. Acknowledgments ................................................16 + 9. References .....................................................17 + 9.1. Normative References ......................................17 + 9.2. Informative References ....................................17 + + + + + + + + + + + + + + + +Le Faucheur Best Current Practice [Page 2] + +RFC 6398 Router Alert Considerations October 2011 + + +1. Introduction + + [RFC2113] and [RFC2711] define the IPv4 and IPv6 Router Alert Options + (RAOs), respectively. In this document, we collectively refer to + those options as the IP Router Alert. The IP Router Alert Option is + an IP option that alerts transit routers to more closely examine the + contents of an IP packet. + + Some of the protocols that make use of the IP Router Alert are the + Resource reSerVation Protocol (RSVP) ([RFC2205], [RFC3175], + [RFC3209]), Pragmatic General Multicast (PGM) ([RFC3208]), the + Internet Group Management Protocol (IGMP) ([RFC3376]), Multicast + Listener Discovery (MLD) ([RFC2710], [RFC3810]), Multicast Router + Discovery (MRD) ([RFC4286]), and Next Steps in Signaling (NSIS) + General Internet Signaling Transport (GIST) ([RFC5971]). + + Section 3 describes the security concerns associated with the use of + the Router Alert Option. + + Section 4 provides guidelines for the use of Router Alert. More + specifically, Section 4.1 recommends that Router Alert not be used + for end-to-end applications over the Internet, while Section 4.2 + presents controlled environments where applications/protocols relying + on IP Router Alert can be deployed effectively and safely. + Section 4.3 provides recommendations on protection approaches to be + used by service providers in order to protect their network from + Router-Alert-based attacks. + + Finally, Section 5 provides generic recommendations for router + implementation of Router Alert, aiming at increasing protection + against attacks. + + This document discusses considerations and practices based on the + current specifications of IP Router Alert ([RFC2113], [RFC2711]). + Possible future enhancements to the specifications of IP Router Alert + (in view of reducing the security risks associated with the use of IP + Router Alert) are outside the scope of this document. One such + proposal is discussed in [RAO-EXT], but at the time of this writing, + the IETF has not adopted any extensions for this purpose. + + The IPv6 base specification [RFC2460] defines the hop-by-hop options + extension header. The hop-by-hop options header is used to carry + optional information that must be examined by every node along a + packet's delivery path. The IPv6 Router Alert Option is one + particular hop-by-hop option. Similar security concerns to those + discussed in this document for the IPv6 Router Alert apply more + generically to the concept of the IPv6 hop-by-hop options extension + header. However, thoroughly addressing the broader concept of the + + + +Le Faucheur Best Current Practice [Page 3] + +RFC 6398 Router Alert Considerations October 2011 + + + IPv6 hop-by-hop option would require additional material so as to + cover additional considerations associated with it (e.g., the + effectiveness of the attack could depend on how many options are + included and on the range to which the option-type value belongs), so + this is kept outside the scope of this document. A detailed + discussion about security risks and proposed remedies associated with + the IPv6 hop-by-hop option can be found in [IPv6-HOPBYHOP]. + + The IPv4 base specification [RFC0791] defines a general notion of + IPv4 options that can be included in the IPv4 header (without + distinguishing between the hop-by-hop and end-to-end options). The + IPv4 Router Alert Option is one particular IPv4 option. Security + concerns similar to those discussed in this document for the IPv4 + Router Alert apply more generically to the concept of the IPv4 + option. However, thoroughly addressing the security concerns of the + broader concept of the IPv4 option is kept outside the scope of this + document, because it would require additional material so as to cover + additional considerations associated with it (such as lack of option + ordering, etc.), and because other IPv4 options are often blocked in + firewalls and not very widely used, so the practical risks they + present are largely nonexistent. + +2. Terminology + + For readability, this document uses the following loosely defined + terms: + + o Fast path: Hardware or Application-Specific Integrated Circuit + (ASIC) processing path for packets. This is the nominal + processing path within a router for IP datagrams. + + o Slow path: Software processing path for packets. This is a sub- + nominal processing path for packets that require special + processing or differ from assumptions made in fast-path + heuristics. + + o Next level protocol: The protocol transported in the IP datagram. + In IPv4 [RFC0791], the next level protocol is identified by the + IANA protocol number conveyed in the 8-bit "Protocol" field in the + IPv4 header. In IPv6 [RFC2460], the next level protocol is + identified by the IANA protocol number conveyed in the 8-bit "Next + Header" field in the IPv6 header. + +2.1. Conventions Used in This Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + + + +Le Faucheur Best Current Practice [Page 4] + +RFC 6398 Router Alert Considerations October 2011 + + +3. Security Concerns of Router Alert + + The IP Router Alert Option is defined ([RFC2113], [RFC2711]) as a + mechanism that alerts transit routers to more closely examine the + contents of an IP packet. [RFC4081] and [RFC2711] mention the + security risks associated with the use of the IP Router Alert: + flooding a router with bogus (or simply undesired) IP datagrams that + contain the IP Router Alert could impact operation of the router in + undesirable ways. For example, if the router punts the datagrams + containing the IP Router Alert Option to the slow path, such an + attack could consume a significant share of the router's slow path + and could also lead to packet drops in the slow path (affecting + operation of all other applications and protocols operating in the + slow path), thereby resulting in a denial of service (DoS) + ([RFC4732]). + + Furthermore, [RFC2113] specifies no (and [RFC2711] specifies a very + limited) mechanism for identifying different users of IP Router + Alert. As a result, many fast switching implementations of IP Router + Alert punt most/all packets marked with IP Router Alert into the slow + path (unless configured to systematically ignore or drop all Router + Alert packets). However, some existing deployed IP routers can and + do process IP packets containing the Router Alert Option inside the + fast path. + + Some IP Router Alert implementations are able to take into account + the next level protocol as a discriminator for the punting decision + for different protocols using IP Router Alert. However, this still + only allows very coarse triage among various protocols using IP + Router Alert, for two reasons. First, the next level protocol is the + same when IP Router Alert is used for different applications of the + same protocol (e.g., RSVP vs. RSVP - Traffic Engineering (RSVP-TE)), + or when IP Router Alert is used for different contexts of the same + application (e.g., different levels of RSVP aggregation [RFC3175]). + Thus, it is not always possible to achieve the necessary triage in + the fast path across IP Router Alert packets from different + applications or from different contexts of an application. Secondly, + some protocols requiring punting might be carried over a transport + protocol (e.g., TCP or UDP), possibly because (1) they require the + services of that transport protocol, (2) the protocol does not + justify allocation of a scarce next level protocol value, or (3) not + relying on a very widely deployed transport protocol is likely to + result in deployment issues due to common middlebox behaviors (e.g., + firewalls or NATs discarding packets of "unknown" protocols). Thus, + considering the next level protocol alone in the fast path is not + sufficient to allow triage in the fast path of IP Router Alert + + + + + +Le Faucheur Best Current Practice [Page 5] + +RFC 6398 Router Alert Considerations October 2011 + + + packets from different protocols sharing the same transport protocol. + Therefore, it is generally not possible to ensure that only the IP + Router Alert packets for next level protocols of interest are punted + to the slow path while other IP Router Alert packets are efficiently + forwarded (i.e., in the fast path). + + Some IP Router Alert implementations are able to take into account + the Value field inside the Router Alert Option. However, only one + value (zero) was defined in [RFC2113], and no IANA registry for IPv4 + Router Alert values was available until recently ([RFC5350]). So + this did not allow most IPv4 Router Alert implementations to support + useful classification based on the Value field in the fast path. + Also, while [RFC2113] states that unknown values should be ignored + (i.e., the packets should be forwarded as normal IP traffic), it has + been reported that some existing implementations simply ignore the + Value field completely (i.e., process any packet with an IPv4 Router + Alert regardless of its option value). An IANA registry for further + allocation of IPv4 Router Alert values has been introduced recently + ([RFC5350]), but this would only allow coarse-grain classification, + if supported by implementations. For IPv6, [RFC2711] states that + "the Value field can be used by an implementation to speed processing + of the datagram within the transit router" and defines an IANA + registry for these values. But again, this only allows coarse-grain + classification. Besides, some existing IPv6 Router Alert + implementations are reported to depart from that behavior. + + [RFC2711] mentions that limiting, by rate or some other means, the + use of the IP Router Alert Option is a way of protecting against a + potential attack. However, if rate limiting is used as a protection + mechanism, but if the granularity of the rate limiting is not fine + enough to distinguish IP Router Alert packets of interest from + unwanted IP Router Alert packets, an IP Router Alert attack could + still severely degrade operation of protocols of interest that depend + on the use of IP Router Alert. + + In a nutshell, the IP Router Alert Option does not provide a + convenient universal mechanism to accurately and reliably distinguish + between IP Router Alert packets of interest and unwanted IP Router + Alert packets. This, in turn, creates a security concern when the IP + Router Alert Option is used, because, short of appropriate router- + implementation-specific mechanisms, the router slow path is at risk + of being flooded by unwanted traffic. + + + + + + + + + +Le Faucheur Best Current Practice [Page 6] + +RFC 6398 Router Alert Considerations October 2011 + + + Note that service providers commonly allow external parties to + communicate with a control plane application in their routers, such + as with BGP peering. Depending on the actual environment and BGP + security practices, with BGP peering, the resulting DoS attack vector + is similar to or somewhat less serious than it would be with the + Router Alert Option for a number of reasons, including the following: + + o With BGP, edge routers only exchange control plane information + with pre-identified peers and can easily filter out any control + plane traffic coming from other peers or non-authenticated peers, + while the Router Alert Option can be received in a datagram with + any source address and any destination address. However, we note + that the effectiveness of such BGP filtering is dependent on + proper security practices; poor BGP security practices (such as + infrequent or nonexistent update of BGP peers' authentication + keys) create vulnerabilities through which the BGP authentication + mechanisms can be compromised. + + o With BGP peering, the control plane hole is only open on the edge + routers, and core routers are completely isolated from any direct + control plane exchange with entities outside the administrative + domain. Thus, with BGP, a DoS attack would only affect the edge + routers, while with the Router Alert Option, the attack could + propagate to core routers. However, in some BGP environments, the + distinction between edge and core routers is not strict, and many/ + most/all routers act as both edge and core routers; in such BGP + environments, a large part of the network is exposed to direct + control plane exchanges with entities outside the administrative + domain (as it would be with Router Alert). + + o With BGP, the BGP policy control would typically prevent re- + injection of undesirable information out of the attacked device, + while with the Router Alert Option, the non-filtered attacking + messages would typically be forwarded downstream. However, we + note that there have been real-life occurrences of situations + where incorrect information was propagated through the BGP system, + causing widespread problems. + +4. Guidelines for Use of Router Alert + +4.1. Use of Router Alert End to End in the Internet (Router Alert in + Peer Model) + + Because of the security concerns associated with Router Alert + discussed in Section 3, network operators SHOULD actively protect + themselves against externally generated IP Router Alert packets. + Because there are no convenient universal mechanisms to triage + between desired and undesired Router Alert packets, network operators + + + +Le Faucheur Best Current Practice [Page 7] + +RFC 6398 Router Alert Considerations October 2011 + + + currently often protect themselves in ways that isolate them from + externally generated IP Router Alert packets. This might be achieved + by tunneling IP Router Alert packets [RFC6178] so that the IP Router + Alert Option is hidden through that network, or it might be achieved + via mechanisms resulting in occasional (e.g., rate limiting) or + systematic drop of IP Router Alert packets. + + Thus, applications and protocols SHOULD NOT be deployed with a + dependency on processing of the Router Alert Option (as currently + specified) across independent administrative domains in the Internet. + Figure 1 illustrates such a hypothetical use of Router Alert end to + end in the Internet. We refer to such a model of Router Alert Option + use as a "Peer Model" Router Alert Option use, since core routers in + different administrative domains would partake in processing of + Router Alert Option datagrams associated with the same signaling + flow. + + -------- -------- -------- -------- + / A \ / B \ / C \ / D \ + | (*) | | (*) | | (*) | | (*) | + | | |<============>| |<=============>| |<=============>| | | + | - | | - | | - | | - | + \ / \ / \ / \ / + -------- -------- -------- -------- + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + Figure 1: Use of Router Alert End to End in the Open Internet + (Router Alert in Peer Model) + + While this recommendation is framed here specifically in the context + of Router Alert, the fundamental security risk that network operators + want to preclude is to allow devices/protocols that are outside of + their administrative domain (and therefore not controlled) to tap + into the control plane of their core routers. Similar security + concerns would probably result whether this control plane access is + provided through the Router Alert Option or provided by any other + mechanism (e.g., deep packet inspection). In other words, the + fundamental security concern is associated with the notion of end-to- + end signaling in a Peer Model across domains in the Internet. As a + result, it is expected that network operators would typically not + want to have their core routers partake in end-to-end signaling with + external uncontrolled devices through the open Internet, and + therefore prevent deployment of end-to-end signaling in a Peer Model + through their network (regardless of whether that signaling uses + Router Alert or not). + + + +Le Faucheur Best Current Practice [Page 8] + +RFC 6398 Router Alert Considerations October 2011 + + +4.2. Use of Router Alert in Controlled Environments + +4.2.1. Use of Router Alert within an Administrative Domain + + In some controlled environments, such as within a given + administrative domain, the network administrator can determine that + IP Router Alert packets will only be received from trusted well- + behaved devices or can establish that specific protection mechanisms + (e.g., RAO filtering and rate limiting) against the plausible RAO- + based DoS attacks are sufficient. In that case, an application + relying on exchange and handling of RAO packets (e.g., RSVP) can be + safely deployed within the controlled network. A private enterprise + network firewalled from the Internet and using RSVP reservations for + voice and video flows might be an example of such a controlled + environment. Such an environment is illustrated in Figure 2. + + ------------------------- -------- -------- + / A \ / B \ / C \ + | (*) (*) | -- | | | | + | | |<============>| | |--|FW|--| |--------| | + | - - | -- | | | | + \ / \ / \ / + ------------------------- -------- -------- + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + FW: Firewall + + Figure 2: Use of Router Alert within an Administrative Domain - + Private Enterprise Network Firewalled from the Internet + and Using RSVP Reservations + + In some controlled environments, several administrative domains have + a special relationship whereby they cooperate very tightly and + effectively operate as a single trust domain. In that case, one + domain is willing to trust another with respect to the traffic + injected across the boundary. In other words, a downstream domain is + willing to trust that the traffic injected at the boundary has been + properly validated/filtered by the upstream domain. Where it has + been established that such trust can be applied to Router Alert + Option packets, an application relying on exchange and handling of + RAO packets (e.g., RSVP) can be safely deployed within such a + controlled environment. The entity within a company responsible for + operating multimedia endpoints and the entity within the same company + + + + + +Le Faucheur Best Current Practice [Page 9] + +RFC 6398 Router Alert Considerations October 2011 + + + responsible for operating the network might be an example of such a + controlled environment. For example, they might collaborate so that + RSVP reservations can be used for video flows from endpoints to + endpoints through the network. + + In some environments, the network administrator can reliably ensure + that Router Alert packets from any untrusted device (e.g., from + external routers) are prevented from entering a trusted area (e.g., + the internal routers). For example, this might be achieved by + ensuring that routers straddling the trust boundary (e.g., edge + routers) always encapsulate those packets (without setting IP Router + Alert -or equivalent- in the encapsulating header) through the + trusted area (as discussed in [RFC6178]). In such environments, the + risks of DoS attacks through the IP Router Alert vector are removed + (or greatly reduced) in the trusted area even if IP Router Alert is + used inside the trusted area (say, for RSVP-TE). Thus, an + application relying on IP Router Alert can be safely deployed within + the trusted area. A service provider running RSVP-TE within its + network might be an example of such a protected environment. Such an + environment is illustrated in Figure 3. + + -------- -------------------------- -------- + / A \ / B \ / C \ + | | | (*) (*) | | | + | |-------TT | |<=============>| | TT------- | | + | | | - - | | | + \ / \ / \ / + -------- -------------------------- -------- + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + TT: Tunneling of Router Alert Option datagrams + + Figure 3: Use of Router Alert within an Administrative Domain - + Service Provider Running RSVP-TE within Its Network + + + + + + + + + + + + + + +Le Faucheur Best Current Practice [Page 10] + +RFC 6398 Router Alert Considerations October 2011 + + +4.2.2. Use of Router Alert in Overlay Model + + In some controlled environment: + + o The sites of a network A are interconnected through a service + provider network B. + + o The service provider network B protects itself from IP Router + Alert messages without dropping those messages when they transit + over the network (for example, using mechanisms discussed in + [RFC6178]). + + In such a controlled environment, an application relying on exchange + and handling of RAO packets (e.g., RSVP) in the network A sites (but + not inside network B) can be safely deployed. We refer to such a + deployment as a use of Router Alert in a Water-Tight Overlay -- + "Overlay", because Router Alert Option datagrams are used in network + A on top of, and completely transparently to, network B; and + "Water-Tight", because Router Alert Option datagrams from network A + cannot leak inside network B. A private enterprise intranet realized + as a Virtual Private Network (VPN) over a service provider network + and using RSVP to perform reservations within the enterprise sites + for voice and video flows might be an example of such a controlled + environment. Such an environment is illustrated in Figure 4. + + -------- -------- + / A \ / A \ + | (*) | | (*) | + | | |<=====================================>| | | + | - | | - | + \ / \ / + -------- -------- + \ / + \ ------------------------- / + \ / B \ / + \| |/ + TT TT + | | + \ / + ------------------------- + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + TT: Tunneling of Router Alert Option datagrams + + Figure 4: Use of Router Alert in Water-Tight Overlay + + + +Le Faucheur Best Current Practice [Page 11] + +RFC 6398 Router Alert Considerations October 2011 + + + In the controlled environment described above, an application relying + on exchange and handling of RAO packets (e.g., RSVP-TE) in the + service provider network B (but not in network A) can also be safely + deployed simultaneously. Such an environment with independent, + isolated deployment of Router Alert in overlay at two levels is + illustrated in Figure 5. + + -------- -------- + / A \ / A \ + | (*) | | (*) | + | | |<=====================================>| | | + | - | | - | + \ / \ / + -------- -------- + \ / + \ ------------------------- / + \ / B \ / + \| (*) (*) |/ + TT | |<============>| | TT + | - - | + \ / + ------------------------- + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + TT: Tunneling of Router Alert Option datagrams + + Figure 5: Use of Router Alert in Water-Tight Overlay at Two Levels + + In some controlled environment: + + o The sites of a network A are interconnected through a service + provider network B. + + o The service provider B processes Router Alert packets on the edge + routers and protects these edge routers against RAO-based attacks + using mechanisms such as (possibly per port) RAO rate limiting and + filtering. + + o The service provider network B protects its core routers from + Router Alert messages without dropping those messages when they + transit over the network (for example, using mechanisms discussed + in [RFC6178]). + + + + + + +Le Faucheur Best Current Practice [Page 12] + +RFC 6398 Router Alert Considerations October 2011 + + + In such a controlled environment, an application relying on exchange + and handling of RAO packets (e.g., RSVP) in the network A sites and + in network B's edges (but not in the core of network B) can be safely + deployed. We refer to such a deployment as a use of Router Alert in + a Leak-Controlled Overlay -- "Overlay", because Router Alert Option + datagrams are used in network A on top of, and completely + transparently to, network B's core; and "Leak-Controlled", because + Router Alert Option datagrams from network A leak inside network B's + edges but not inside network B's core. A private enterprise + intranet, whose sites are interconnected through a service provider + network, using RSVP for voice and video within network A sites as + well as on network B's edge to extend the reservation onto the + attachment links between networks A and B (as specified in + [RFC6016]), might be an example of such a controlled environment. + Such an environment is illustrated in Figure 6. + + -------- -------- + / A \ / A \ + | | | | + | | ------------------------ | | + | (*) | /(*) (*) \ | (*) | + | | |<======>| |<============>| |<=========>| | | + | - | | - - | | - | + \ / | \ - - / | \ / + -------- | TT-| | | |-TT | -------- + | - - | + \ / + ------------------------ + + (*) closer examination of Router Alert Option datagrams + + <==> flow of Router Alert Option datagrams + + TT: Tunneling of Router Alert Option datagrams + + Figure 6: Use of Router Alert in Leak-Controlled Overlay + +4.3. Router Alert Protection Approaches for Service Providers + + Section 3 discusses the security risks associated with the use of the + IP Router Alert and how it opens up a DoS vector in the router + control plane. Thus, a service provider MUST implement strong + protection of its network against attacks based on IP Router Alert. + + As discussed in Section 4.2.2, some applications can benefit from the + use of IP Router Alert packets in an Overlay Model (i.e., where + Router Alert packets are exchanged transparently on top of a service + provider). Thus, a service provider protecting its network from + + + +Le Faucheur Best Current Practice [Page 13] + +RFC 6398 Router Alert Considerations October 2011 + + + attacks based on IP Router Alert SHOULD use mechanisms that avoid (or + at least minimize) the dropping of end-to-end IP Router Alert packets + (other than those involved in an attack). + + For example, if the service provider does not run any protocol + depending on IP Router Alert within its network, it might elect to + simply turn off punting/processing of IP Router Alert packets on its + routers; this will ensure that end-to-end IP Router Alert packets + transit transparently and safely through its network. + + As another example, using protection mechanisms such as selective + filtering and rate limiting (which Section 5 suggests be supported by + IP Router Alert implementations), a service provider can protect the + operation of a protocol depending on IP Router Alert within its + network (e.g., RSVP-TE) while at the same time transporting IP Router + Alert packets carrying another protocol that might be used end to + end. Note that the service provider might additionally use protocol- + specific mechanisms that reduce the dependency on Router Alert for + operation of this protocol inside the service provider environment; + use of RSVP refresh reduction mechanisms ([RFC2961]) would be an + example of such mechanisms in the case where the service provider is + running RSVP-TE within its network, since this allows the refresh of + existing Path and Resv states without the use of the IP Router Alert + Option. + + As yet another example, using mechanisms such as those discussed in + [RFC6178], a service provider can safely protect the operation of a + protocol depending on IP Router Alert within its network (e.g., + RSVP-TE) while at the same time safely transporting IP Router Alert + packets carrying another protocol that might be used end to end + (e.g., IPv4/IPv6 RSVP). We observe that while tunneling of Router + Alert Option datagrams over an MPLS backbone as discussed in + [RFC6178] is well understood, tunneling Router Alert Option datagrams + over a non-MPLS IP backbone presents a number of issues (in + particular, for determining where to forward the encapsulated + datagram) and is not common practice at the time of writing this + document. + + As a last resort, if the service provider does not have any means to + safely transport end-to-end IP Router Alert Option packets over its + network, the service provider can drop those packets. It must be + noted that this has the undesirable consequence of preventing the use + of the Router Alert Option in the Overlay Model on top of that + network, and therefore prevents users of that network from deploying + a number of valid applications/protocols in their environment. + + + + + + +Le Faucheur Best Current Practice [Page 14] + +RFC 6398 Router Alert Considerations October 2011 + + +5. Guidelines for Router Alert Implementation + + A router implementation of the IP Router Alert Option SHOULD include + protection mechanisms against Router-Alert-based DoS attacks as + appropriate for their targeted deployment environments. For example, + this can include the ability of an edge router to "tunnel" received + IP Router Alert Option packets when forwarding those packets over the + core, as discussed in [RFC6178]. As another example, although not + always available from current implementations, new implementations + MAY include protection mechanisms such as selective (possibly + dynamic) filtering and rate limiting of IP Router Alert Option + packets. + + In particular, router implementations of the IP Router Alert Option + SHOULD offer the configuration option to simply ignore the presence + of "IP Router Alert" in IPv4 and IPv6 packets. As discussed in + Section 4.3, that permits IP Router Alert packets to transit a + network segment without presenting an adverse operational security + risk to that particular network segment, provided the operator of + that network segment does not ever use the IP Router Alert messages + for any purpose. + + If an IP packet contains the IP Router Alert Option, but the next + level protocol is not explicitly identified as a protocol of interest + by the router examining the packet, the behavior is not explicitly + defined by [RFC2113]. However, the behavior is implied, and, for + example, the definition of RSVP in [RFC2205] assumes that the packet + will be forwarded using normal forwarding based on the destination IP + address. Thus, a router implementation SHOULD forward within the + "fast path" (subject to all normal policies and forwarding rules) a + packet carrying the IP Router Alert Option containing a next level + protocol that is not a protocol of interest to that router. The "not + punting" behavior protects the router from DoS attacks using IP + Router Alert packets of a protocol unknown to the router. The + "forwarding" behavior contributes to transparent end-to-end transport + of IP Router Alert packets (e.g., to facilitate their use by end-to- + end applications). + + Similarly, an implementation MAY support selective forwarding within + the fast path (subject to all normal policies and forwarding rules) + or punting of a packet with the IP Router Alert Option, based on the + Value field of the Router Alert Option. This would allow router + protection against DoS attacks using IP Router Alert packets with a + value that is not relevant for that router (e.g., nesting levels of + aggregated RSVP reservation [RFC5350]). + + + + + + +Le Faucheur Best Current Practice [Page 15] + +RFC 6398 Router Alert Considerations October 2011 + + +6. Security Considerations + + This document expands the security considerations of [RFC2113] and + [RFC2711], which define the IPv4 and IPv6 RAOs, respectively, by + discussing security risks associated with usage of the current IP + Router Alert Option and associated practices. See [RFC4081] for + additional security considerations. + +7. Contributors + + The contributors to this document (in addition to the editor) are: + + Reshad Rahman + Cisco Systems + rrahman@cisco.com + + David Ward + Juniper Networks + dward@juniper.net + + Ashok Narayanan + Cisco Systems + ashokn@cisco.com + + Adrian Farrel + OldDog Consulting + adrian@olddog.co.uk + + Tony Li + Cisco Systems + tony.li@tony.li + +8. Acknowledgments + + The editor and contributors would like to thank Dave Oran, Magnus + Westerlund, John Scudder, Ron Bonica, Ross Callon, Alfred Hines, + Carlos Pignataro, Roland Bless, Jari Arkko, and Ran Atkinson for + their comments. This document also benefited from discussions with + Jukka Manner and Suresh Krishnan. The discussion about use of the + Value field in the IPv4 Router Alert is borrowed from a similar + discussion in [RFC5971]. + + + + + + + + + + +Le Faucheur Best Current Practice [Page 16] + +RFC 6398 Router Alert Considerations October 2011 + + +9. References + +9.1. Normative References + + [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC2113] Katz, D., "IP Router Alert Option", RFC 2113, + February 1997. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", RFC 2460, December 1998. + + [RFC2711] Partridge, C. and A. Jackson, "IPv6 Router Alert Option", + RFC 2711, October 1999. + + [RFC5350] Manner, J. and A. McDonald, "IANA Considerations for the + IPv4 and IPv6 Router Alert Options", RFC 5350, + September 2008. + +9.2. Informative References + + [IPv6-HOPBYHOP] + Krishnan, S., "The case against Hop-by-Hop options", Work + in Progress, October 2010. + + [RAO-EXT] Narayanan, A., Le Faucheur, F., Ward, D., and R. Rahman, + "IP Router Alert Option Extension", Work in Progress, + March 2009. + + [RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S. + Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 + Functional Specification", RFC 2205, September 1997. + + [RFC2710] Deering, S., Fenner, W., and B. Haberman, "Multicast + Listener Discovery (MLD) for IPv6", RFC 2710, + October 1999. + + [RFC2961] Berger, L., Gan, D., Swallow, G., Pan, P., Tommasi, F., + and S. Molendini, "RSVP Refresh Overhead Reduction + Extensions", RFC 2961, April 2001. + + [RFC3175] Baker, F., Iturralde, C., Le Faucheur, F., and B. Davie, + "Aggregation of RSVP for IPv4 and IPv6 Reservations", + RFC 3175, September 2001. + + + +Le Faucheur Best Current Practice [Page 17] + +RFC 6398 Router Alert Considerations October 2011 + + + [RFC3208] Speakman, T., Crowcroft, J., Gemmell, J., Farinacci, D., + Lin, S., Leshchiner, D., Luby, M., Montgomery, T., Rizzo, + L., Tweedly, A., Bhaskar, N., Edmonstone, R., + Sumanasekera, R., and L. Vicisano, "PGM Reliable Transport + Protocol Specification", RFC 3208, December 2001. + + [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., + and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP + Tunnels", RFC 3209, December 2001. + + [RFC3376] Cain, B., Deering, S., Kouvelas, I., Fenner, B., and A. + Thyagarajan, "Internet Group Management Protocol, + Version 3", RFC 3376, October 2002. + + [RFC3810] Vida, R., Ed., and L. Costa, Ed., "Multicast Listener + Discovery Version 2 (MLDv2) for IPv6", RFC 3810, + June 2004. + + [RFC4081] Tschofenig, H. and D. Kroeselberg, "Security Threats for + Next Steps in Signaling (NSIS)", RFC 4081, June 2005. + + [RFC4286] Haberman, B. and J. Martin, "Multicast Router Discovery", + RFC 4286, December 2005. + + [RFC4732] Handley, M., Ed., Rescorla, E., Ed., and IAB, "Internet + Denial-of-Service Considerations", RFC 4732, + December 2006. + + [RFC5971] Schulzrinne, H. and R. Hancock, "GIST: General Internet + Signalling Transport", RFC 5971, October 2010. + + [RFC6016] Davie, B., Le Faucheur, F., and A. Narayanan, "Support for + the Resource Reservation Protocol (RSVP) in Layer 3 VPNs", + RFC 6016, October 2010. + + [RFC6178] Smith, D., Mullooly, J., Jaeger, W., and T. Scholl, "Label + Edge Router Forwarding of IPv4 Option Packets", RFC 6178, + March 2011. + + + + + + + + + + + + + +Le Faucheur Best Current Practice [Page 18] + +RFC 6398 Router Alert Considerations October 2011 + + +Author's Address + + Francois Le Faucheur (editor) + Cisco Systems + Greenside, 400 Avenue de Roumanille + Sophia Antipolis 06410 + France + + Phone: +33 4 97 23 26 19 + EMail: flefauch@cisco.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Le Faucheur Best Current Practice [Page 19] + |