diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6959.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6959.txt')
-rw-r--r-- | doc/rfc/rfc6959.txt | 1403 |
1 files changed, 1403 insertions, 0 deletions
diff --git a/doc/rfc/rfc6959.txt b/doc/rfc/rfc6959.txt new file mode 100644 index 0000000..ca7699d --- /dev/null +++ b/doc/rfc/rfc6959.txt @@ -0,0 +1,1403 @@ + + + + + + +Internet Engineering Task Force (IETF) D. McPherson +Request for Comments: 6959 VeriSign, Inc. +Category: Informational F. Baker +ISSN: 2070-1721 Cisco Systems + J. Halpern + Ericsson + May 2013 + + + Source Address Validation Improvement (SAVI) Threat Scope + +Abstract + + The Source Address Validation Improvement (SAVI) effort aims to + complement ingress filtering with finer-grained, standardized IP + source address validation. This document describes threats enabled + by IP source address spoofing both in the global and finer-grained + context, describes currently available solutions and challenges, and + provides a starting point analysis for finer-grained (host + granularity) anti-spoofing work. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6959. + + + + + + + + + + + + + + + +McPherson, et al. Informational [Page 1] + +RFC 6959 SAVI Threat Scope May 2013 + + +Copyright Notice + + Copyright (c) 2013 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Overview ........................................................3 + 2. Glossary of Terms ...............................................5 + 3. Spoof-Based Attack Vectors ......................................6 + 3.1. Blind Attacks ..............................................6 + 3.1.1. Single-Packet Attacks ...............................6 + 3.1.2. Flood-Based DoS .....................................7 + 3.1.3. Poisoning Attacks ...................................8 + 3.1.4. Spoof-Based Worm/Malware Propagation ................8 + 3.1.5. Reflective Attacks ..................................8 + 3.1.6. Accounting Subversion ...............................9 + 3.1.7. Other Blind Spoofing Attacks ........................9 + 3.2. Non-blind Attacks ..........................................9 + 3.2.1. Man in the Middle (MITM) ............................9 + 3.2.2. Third-Party Recon ..................................10 + 3.2.3. Other Non-blind Spoofing Attacks ...................10 + 4. Current Anti-spoofing Solutions ................................11 + 4.1. Topological Locations for Enforcement .....................13 + 4.1.1. Host to Link-Layer Neighbor via Switch .............13 + 4.1.2. Upstream Switches ..................................13 + 4.1.3. Upstream Routers ...................................14 + 4.1.4. ISP Edge PE Router .................................14 + 4.1.5. ISP NNI Router to ISP NNI Router ...................15 + 4.1.6. Cable Modem Subscriber Access ......................15 + 4.1.7. DSL Subscriber Access ..............................15 + 4.2. Currently Available Tools .................................16 + 4.2.1. BCP 38 .............................................16 + 4.2.2. Unicast RPF ........................................16 + 4.2.3. Port-Based Address Binding .........................16 + 4.2.4. Cryptographic Techniques ...........................17 + 4.2.5. Residual Attacks ...................................18 + + + + +McPherson, et al. Informational [Page 2] + +RFC 6959 SAVI Threat Scope May 2013 + + + 5. Topological Challenges Facing SAVI .............................18 + 5.1. Address Provisioning Mechanisms ...........................18 + 5.2. LAN Devices with Multiple Addresses .......................18 + 5.2.1. Routers ............................................18 + 5.2.2. NATs ...............................................19 + 5.2.3. Multi-instance Hosts ...............................19 + 5.2.4. Multi-LAN Hosts ....................................20 + 5.2.5. Firewalls ..........................................20 + 5.2.6. Mobile IP ..........................................20 + 5.2.7. Other Topologies ...................................21 + 5.3. IPv6 Considerations .......................................21 + 6. Analysis of Host Granularity Anti-spoofing .....................21 + 7. Security Considerations ........................................22 + 7.1. Privacy Considerations ....................................23 + 8. Acknowledgments ................................................24 + 9. References .....................................................24 + 9.1. Normative References ......................................24 + 9.2. Informative References ....................................24 + +1. Overview + + The Internet Protocol, specifically IPv4 [RFC0791] and IPv6 + [RFC2460], employs a connectionless hop-by-hop packet forwarding + paradigm. A host connected to an IP network that wishes to + communicate with another host on the network generates an IP packet + with source and destination IP addressing information, among other + options. + + At the IP network layer, or Internet layer, there is typically no + required transactional state when communicating with other hosts on + the network. In particular, the network does not track any state + about the hosts using the network. This is normally a benefit. + However, as a consequence of this, hosts generating packets for + transmission have the opportunity to spoof (forge) the source address + of packets that they transmit, as the network does not have any way + to tell that some of the information is false. + + Source address validation is necessary in order to detect and reject + spoofed IP packets in the network, and contributes to the overall + security of IP networks. This document deals with the subset of such + validation done by the network based on observed traffic and policy. + Such source address validation techniques enable detection and + rejection of many spoofed packets, and also implicitly provide some + assurances that the source address in an IP packet is legitimately + assigned to the system that generated the packet. + + + + + + +McPherson, et al. Informational [Page 3] + +RFC 6959 SAVI Threat Scope May 2013 + + + Solutions such as those described in BCP 38 [RFC2827] provide + guidelines for one such technique for network ingress filtering. + However, if these techniques are not implemented at the ingress point + of the IP network, then the validity of the source address cannot be + positively ascertained. Furthermore, BCP 38 only implies source + address validation at the Internet layer and is most often + implemented on IP subnetwork address boundaries. One of the + difficulties in encouraging the deployment of BCP 38 is that there is + relatively little benefit until it is very widely deployed, which is + not yet the case. + + Hence, in order to try to get better behavior, it is helpful to look + for an application like that described in BCP 38, but one that can be + applied locally and give locally beneficial results. The local + benefit would provide a reason for the site to deploy, while moving + the Internet as a whole towards an environment where BCP 38 is widely + effected. SAVI is aimed at providing more specific protection + locally, with the benefit of better local behavior and, in + conjunction with appropriate logging, better local traceability, + while also providing better compliance with the cases dealt with by + BCP 38. + + It should be noted that while BCP 38 directs providers to provide + protection from spoofed prefixes, it is clearly desirable for + enterprise operators to provide that protection more locally, and + with better traceability. This allows the enterprise to be a better + Internet participant and to quickly detect and remedy problems when + they occur. For example, when an enterprise receives a report of an + attack originating within that enterprise, the operational staff + desires to be able to track from the IP address sourcing the attack + to the particular machine within the enterprise that is the source. + This is typically simpler and more reliable than other techniques, + such as trying to find the attack in ongoing outbound traffic. To do + this, the enterprise needs usable address assignment and usage + information (appropriate logging), as well as accurate information + (SAVI), to determine that no other machine could have been using that + address. + + Also, there is a possibility that in a LAN environment where multiple + hosts share a single LAN or IP port on a switch or router, one of + those hosts may spoof the source addresses of other hosts within the + local subnet. Understanding these threats and the relevant + topologies in which they're introduced is critical when assessing the + threats that exist with source address spoofing. + + This document provides additional details regarding spoof-based + threat vectors and discusses implications of various network + topologies. + + + +McPherson, et al. Informational [Page 4] + +RFC 6959 SAVI Threat Scope May 2013 + + +2. Glossary of Terms + + The following acronyms and terms are used throughout this memo. + + Binding Anchor: The relationship used by a device performing source + address enforcement to perform the validation and enforcement. + Examples in different situations include Layer 2 addresses or + physical ports. + + BGP: The Border Gateway Protocol, used to manage routing policy + between large networks. + + CPE Router: Customer Premises Equipment router. The router on the + customer premises, whether owned by the customer or the provider. + Also called the Customer Edge, or CE, router. + + IP Address: An Internet Protocol address, whether IPv4 or IPv6. + + ISP: Internet Service Provider. Any person or company that delivers + Internet service to another. + + MAC Address: An Ethernet address or comparable IEEE 802 series + address. + + NNI Router: Network-to-Network Interface router. This router + interface faces a similar system operated by another ISP or other + large network. + + PE Router: Provider Edge router. This router faces a customer of an + ISP. + + Spoofing: The act of sending a datagram header whose contents at the + link layer or network layer do not match the network policies and + activities on address assignment or claiming. Generally, this + corresponds to sending messages with source network or link-layer + information that is assigned to or currently properly claimed by + some other devices in the network. + + TCP: The Transmission Control Protocol, used on end systems to + manage data exchange. + + uRPF: Unicast Reverse Path Forwarding. A procedure in which the + route table, which is usually used to look up destination + addresses and route towards them, is used to look up the source + address and ensure that one is routing away from it. When this + test fails, the event may be logged, and the traffic is commonly + dropped. + + + + +McPherson, et al. Informational [Page 5] + +RFC 6959 SAVI Threat Scope May 2013 + + +3. Spoof-Based Attack Vectors + + Spoofing is employed on the Internet for a number of reasons, most of + which are in some manner associated with malicious or otherwise + nefarious activities. In general, two classes of spoof-based attack + vectors exist: blind attacks and non-blind attacks. The following + sections provide some information on blind and non-blind attacks; + these sections also include information on attacks where the spoofing + is primarily intended to interfere with tracing the attacks, as well + as attacks where spoofing the source address is a necessary component + to the damage or interference. + +3.1. Blind Attacks + + Blind attacks typically occur when an attacker isn't on the same + local area network as a source or target, or when an attacker has no + access to the data path between the attack source(s) and the target + systems. In this situation, the attacker has no access to the source + and target systems. + +3.1.1. Single-Packet Attacks + + One type of blind attacks, which we'll refer to here as "single- + packet DoS (Denial of Service) attacks", involves an attacking system + injecting spoofed information into the network, which either results + in a complete crash of the target system, or in some manner poisons + some network configuration or other information on a target system so + as to impact network or other services. + + An example of an attack that can cause a receiving system to crash is + what is called a LAND (Local Area Network Denial) attack. A LAND + attack would consist of an attacking system sending a packet (e.g., + TCP SYN) to a target system that contains both a source and + destination address of that target system. The packet would also + contain a single value for the port number, used as both the source + and destination port number. Certain target systems will then "lock + up" when creating connection state associated with the packet or + would get stuck in a state where a target system continuously replies + to itself. As this is an attack that relies on bugs in the target, + it is possible, but by no means certain, that this threat is no + longer viable. + + Another form of blind attack is a RST (reset) probe ([RFC4953], + Section 2.3). The attacker sends a series of packets to a + destination that is engaged in a long-lived TCP session. The packets + are RST packets, and the attacker uses the known source and + destination addresses and port numbers, along with guesses at the + sequence number. If he can send a packet close enough to the right + + + +McPherson, et al. Informational [Page 6] + +RFC 6959 SAVI Threat Scope May 2013 + + + value, in theory he can terminate the TCP connection. While there + are various steps that have been developed to ameliorate this attack, + preventing the spoofing of source addresses completely prevents the + attack from occurring. + +3.1.2. Flood-Based DoS + + Flood-based DoS attack vectors are particularly effective attacks on + the Internet today. They usually entail flooding a large number of + packets towards a target system, with the hopes of either exhausting + connection state on the target system, consuming all packet + processing capabilities of the target or intermediate systems, or + consuming a great deal of bandwidth available to the target system + such that they are essentially inaccessible. + + Because these attacks require no reply from the target system and + require no legitimate transaction state, attackers often attempt to + obfuscate the identity of the systems that are generating the attack + traffic by spoofing the source IP address of the attacking traffic + flows. Because ingress filtering isn't applied ubiquitously on the + Internet today, spoof-based flooding attack vectors are typically + very difficult to trace back. In particular, there may be one or + more attacking sources beyond a network's border, and the attacking + sources may or may not be legitimate sources; it's difficult to + determine if the sources are not directly connected to the local + routing system. These attacks might be seen as primarily needing to + be addressed by BCP 38 deployment, which is not in scope for this + document. However, as noted earlier, deployment of SAVI can help + remediate lack of BCP 38 deployment, and even when BCP 38 is + deployed, SAVI can help provide useful information for responding to + such attacks. + + Common flood-based DoS attack vectors today include SYN floods, ICMP + floods, and IP fragmentation attacks. Attackers may use a single + legitimate or spoofed fixed attacking source address, although + frequently they cycle through large swaths of address space. As a + result, mitigating these attacks on the receiving end with source- + based policies is extremely difficult. + + If an attacker can inject messages for a protocol that requires + control-plane activity, it may be possible to deny network control + services at a much lower attack level. While there are various forms + of protection deployed against this, they are by no means complete. + Attacks that are harder to trace (such as with spoofed addresses) are + of course of more concern. + + + + + + +McPherson, et al. Informational [Page 7] + +RFC 6959 SAVI Threat Scope May 2013 + + + Furthermore, the motivator for spoof-based DoS attacks may actually + be to encourage the target to filter explicitly on a given set of + source addresses, in order to disrupt access to the target system by + legitimate owner(s). + +3.1.3. Poisoning Attacks + + While poisoning attacks can often be done with single packets, it is + also true that a stream of packets can be used to find a window where + the target will accept the incorrect information. In general, this + can be used to perform broadly the same kinds of poisonings as above, + with more versatility. + + One important class of poisoning attacks are attacks aimed at + poisoning network or DNS cache information, perhaps to simply break a + given host's connection or to enable MITM (Man in the Middle) or + other attacks. Network-level attacks that could involve single- + packet DoS include Address Resolution Protocol (ARP) cache poisoning + and ICMP redirects. The most obvious example, which depends upon + falsifying an IP source address, is an on-link attacker poisoning a + router's ARP or Neighbor Discovery (ND) cache. The ability to forge + a source address can also be helpful in causing a DNS cache to accept + and use incorrect information. + +3.1.4. Spoof-Based Worm/Malware Propagation + + Self-propagating malware has been observed that spoofs its source + address when attempting to propagate to other systems. Presumably, + this was done to obfuscate the actual source address of the infected + system. This attack is important both in terms of an attack vector + that SAVI may help prevent and as a problem that SAVI can help solve + by tracing back to find infected systems. + +3.1.5. Reflective Attacks + + Reflective amplification attacks -- wherein a sender sends a single + packet to an intermediary, resulting in the intermediary sending a + large number of packets, or much larger packets, to the target -- are + a particularly potent DoS attack vector on the Internet today. Many + of these attacks rely on using a false source address, so that the + amplifier attacks the target by responding to the messages. + + DNS is one of the common targets of such attacks. The amplification + factor observed for attacks targeting DNS root and other top-level + domain name infrastructures in early 2006 was on the order of 72:1 + [VRSN-REPORT]. The result was that just 27 attacking sources with + 512 kbps of upstream attack bandwidth could generate 1 Gbps of + response attack traffic towards a target system. + + + +McPherson, et al. Informational [Page 8] + +RFC 6959 SAVI Threat Scope May 2013 + + + Smurf attacks employ a similar reflective amplification attack + vector, exploiting traditional default IP-subnet-directed broadcast + address behaviors that would result in all the active hosts on a + given subnet responding to a (spoofed) ICMP echo request from an + attacker and generating a large amount of ICMP echo response traffic + directed towards a target system. These attacks have been + particularly effective in large campus LAN environments where 50K or + more hosts might reside on a single subnet. + +3.1.6. Accounting Subversion + + If an attacker wishes to distribute content or other material in a + manner that employs protocols that require only unidirectional + flooding and generate no end-to-end transactional state, they may + desire to spoof the source IP address of that content in order to + avoid detection or accounting functions enabled at the IP layer. + While this particular attack has not been observed, it is included + here to reflect the range of power that spoofed addresses may have, + even without the ability to receive responses. + +3.1.7. Other Blind Spoofing Attacks + + Other blind spoofing attacks might include spoofing in order to + exploit source routing or other policy-based routing implemented in a + network. It may also be possible in some environments to use + spoofing techniques to perform blind or non-blind attacks on the + routers in a site or in the Internet. There are many techniques to + mitigate these attacks, but it is well known that there are + vulnerabilities in this area. + +3.2. Non-blind Attacks + + Non-blind attacks often involve mechanisms such as eavesdropping on + connections, resetting state so that new connections may be hijacked, + and an array of other attack vectors. Perhaps the most common of + these attack vectors are known as man-in-the-middle attacks. In this + case, we are concerned not with an attacker who can modify a stream, + but rather with one who has access to information from the stream and + uses that information to launch his own attacks. + +3.2.1. Man in the Middle (MITM) + + Connection hijacking is one of the more common man-in-the-middle + attack vectors. In order to hijack a connection, an attacker usually + needs to be in the forwarding path and oftentimes employs TCP RST or + other attacks in order to reset a transaction. The attacker may have + already compromised a system that's in the forwarding path, or they + may wish to insert themselves in the forwarding path. + + + +McPherson, et al. Informational [Page 9] + +RFC 6959 SAVI Threat Scope May 2013 + + + For example, an attacker with access to a host on a LAN segment may + wish to redirect all the traffic on the local segment destined for a + default gateway address (or all addresses) to itself in order to + perform man-in-the-middle attacks. In order to accomplish this in + IPv4, the attacker might transmit gratuitous ARP [RFC0826] messages + or ARP replies to the Ethernet broadcast address ff:ff:ff:ff:ff:ff, + notifying all the hosts on the segment that the IP address(es) of the + target(s) now maps to its own Layer 2 address. The source IP address + in this case is spoofed. Similar vulnerabilities exist in the IPv6 + ND protocol [RFC4861], although the multicast requirements of the + IPv6 ND protocol make this harder to perform with the same + generality. + +3.2.2. Third-Party Recon + + Another example of a non-blind attack is third-party reconnaissance. + The use of spoofed addresses, while not necessary for this, can often + provide additional information and helps mask the traceability of the + activity. The attack involves sending packets towards a given target + system and observing either target or intermediate system responses. + For example, if an attacker were to source spoof TCP SYN packets + towards a target system from a large set of source addresses and + observe responses from that target system or some intermediate + firewall or other middlebox, they would be able to identify what + IP-layer filtering policies may be in place to protect that system. + +3.2.3. Other Non-blind Spoofing Attacks + + There are presumably many other attacks that can be performed based + on the ability to spoof source addresses while seeing the target. + Among other attacks, if there are multiple routers on-link with + hosts, a host may be able to cause problems for the routing system by + replaying modified or unmodified routing packets as if they came from + another router. + + + + + + + + + + + + + + + + + +McPherson, et al. Informational [Page 10] + +RFC 6959 SAVI Threat Scope May 2013 + + +4. Current Anti-spoofing Solutions + + The goal of this work is to reduce datagrams with spoofed IP + addresses from the Internet. This can be aided by identifying and + dropping datagrams whose source address binding is incompatible with + the Internet topology and learned information. This can be done at + sites where the relationship between the source address and topology + and binding information can be checked. For example, with these + bindings, in many networks Internet devices can confirm that: + + o The IP source address is appropriate for the lower-layer address + (they both identify the same system). + + o The IP source address is explicitly identified as appropriate for + the physical topology; for example, the source address is + appropriate for the Layer 2 switch port through which the datagram + was received. + + o The prefix to which the IP source address belongs is appropriate + for the part of the network topology from which the IP datagram + was received (while the individual system may be unknown, it is + reasonable to believe that the system is located in that part of + the network). + + In general, this involves two kinds of inspection. The primary + action is checking the source IP address in the IP header of IP + packets. In order to support such checking, the claimed or assigned + IP addresses in messages concerned with such claims or assignments + (IP ARP Requests and Responses, DHCP Replies, IPv6 ND Duplicate + Address Detection (DAD) messages, etc.) must also be examined and, + where appropriate, verified. SAVI is not concerned with verifying IP + addresses in the contents of arbitrary higher-level protocol + messages. + + Filtering points farther away from the source of the datagram can + make decreasingly authoritative assertions about the validity of the + source address in the datagram. Nonetheless, there is value in + dropping traffic that is clearly inappropriate and in maintaining + knowledge of the level of trust one can place in an address. + + + + + + + + + + + + +McPherson, et al. Informational [Page 11] + +RFC 6959 SAVI Threat Scope May 2013 + + + Edge Network 1 CPE-ISP _.------------. + _.----------------. Ingress/ ISP A `--. + ,--'' `---. ,' `. + ,' +----+ +------+ +------+ `. / +------+ +------+ \\ + ( |Host+--+Switch+--+ CPE +---)-(---+ PE +- - - -+ NNI | ) + `. +----+ +------+ |Router| ,' \\ |Router| |Router| / + `---. Host-neighbor +------+' `.+------+ +--+---+,' + `----------------'' '--. |_.-' + `------------'| + | + Edge Network 2 ISP-ISP Ingress | + _.----------------. _.----------.| + ,--'' `---. ,-'' |--. + ,' +----+ +------+ +------+ `. ,+------+ +--+---+. + ( |Host+--+Switch+--+ CPE +---)---+-+ PE +- - - -+ NNI | \\ + `. +----+ +------+ |Router| ,' ( |Router| |Router| ) + `---. +------+' \\+------+ +------+ / + `----------------'' `. ,' + '--. ISP B _.-' + `----------'' + + Figure 1: Points Where an Address Can Be Validated + + Figure 1 illustrates five related paths where a source address can be + validated: + + o Host to switch, including host to host via the switch + + o Host to enterprise CPE router + + o Enterprise CPE router to ISP edge PE router, and the reverse + + o ISP NNI router to ISP NNI router + + In general, datagrams with spoofed IP addresses can be detected and + discarded by devices that have an authoritative mapping between IP + addresses and the network topology. For example, a device that has + an authoritative table between link-layer and IP addresses on a link + can discard any datagrams in which the IP address is not associated + with the link-layer address in the datagram. The degree of + confidence in the source address depends on where the spoofing + detection is performed, as well as the prefix aggregation in place + between the spoofing detection and the source of the datagram. + + + + + + + + +McPherson, et al. Informational [Page 12] + +RFC 6959 SAVI Threat Scope May 2013 + + +4.1. Topological Locations for Enforcement + + There are a number of kinds of places, which one might call + topological locations, where solutions may or should be deployed. As + can be seen in the details below, as the point of enforcement moves + away from a single cable attached directly to the host being + validated, additional complications arise. It is likely that fully + addressing many of these cases may require additional coordination + mechanisms across the device that covers the disparate paths. + +4.1.1. Host to Link-Layer Neighbor via Switch + + The first point at which a datagram with a spoofed address can be + detected is on the link to which the source of the datagram is + connected. At this point in the network, the source link-layer and + IP addresses are both available and can be validated against each + other, and potentially against the physical port being used. A + datagram in which the IP source address does not match the + corresponding link-layer address can be discarded. Of course, the + trust in the filtering depends on the trust in the method through + which the mappings are developed. This mechanism can be applied by a + first-hop router, or switch on the link. The first-hop switch has + the most precise information for this. + + On a truly shared medium link, such as classic Ethernet, the best + that can be done is to validate the link-layer and IP addresses + against the mappings. When the link is not shared, such as when the + hosts are connected through a switch, the source host can be + identified precisely based on the port through which the datagram is + received or the Layer 2 address if it is known to the switch. Port + identification prevents transmission of malicious datagrams whose + link-layer and IP addresses are both spoofed to mimic another host. + + Other kinds of links may fall at different places in this spectrum, + with some wireless links having easier ways of identifying individual + devices than others, for example. + +4.1.2. Upstream Switches + + In many topologies, there can be additional switches between the + host-attached switch and the first router in the network. In these + cases, additional issues can arise that affect SAVI operations. If + the bridging topologies that connect the switches change, or if the + Link Aggregation Control Protocol (LACP) [IEEE802.1AX], the Virtual + Router Redundancy Protocol (VRRP), or link management operations + change the links that are used to deliver traffic, the switch may + need to move the SAVI state to a different port, or the state may + need to be moved or reestablished on a different switch. + + + +McPherson, et al. Informational [Page 13] + +RFC 6959 SAVI Threat Scope May 2013 + + +4.1.3. Upstream Routers + + Beyond the first-hop router, subsequent routers may additionally + filter traffic from downstream networks. Because these routers do + not have access to the link-layer address of the device from which + the datagram was sent, they are limited to confirming that the source + IP address is within a prefix that is appropriate for a downstream + router from which the datagram was received. + + Options include the use of simple access lists or the use of Unicast + Reverse Path Forwarding (uRPF). Access lists are generally + appropriate only for the simplest cases, as management can be + difficult. Strict uRPF accepts the source address on a datagram if + and only if it comes from a direction that would be rational to send + a datagram directed to the address, which means that the filter is + derived from routing information. These filtering procedures are + discussed in more detail in [RFC3704]. + + In many cases, this router has access to information about what IP + prefixes are to be used on a given subnet. This might be because it + delegated that prefix through DHCP or monitored such a delegation. + It may have advertised that prefix in IPv6 Neighbor Discovery Router + Advertisement messages, or monitored such an advertisement. These + can be seen as generalizations of the access lists above. When the + topology permits, the router can enforce that these prefixes are used + by the hosts. + +4.1.4. ISP Edge PE Router + + An obvious special case of the discussion is with an ISP PE router, + where it provides its customer with access. BCP 38 specifically + encourages ISPs to use ingress filtering to limit the incidence of + spoofed addresses in the network. + + The question that the ISP must answer for itself is the degree to + which it trusts its downstream network. A contract might be written + between an ISP and its customer requiring that the customer apply the + procedures of network ingress filtering to the customer's own + network, although there's no way upstream networks would be able to + validate this. + + Conversely, if the provider has assigned a single IP address to the + customer (for example, with IPv4 NAT in the CPE), PE enforcement of + BCP 38 can be on the full address, simplifying many issues. + + + + + + + +McPherson, et al. Informational [Page 14] + +RFC 6959 SAVI Threat Scope May 2013 + + +4.1.5. ISP NNI Router to ISP NNI Router + + The considerations explicitly related to customer networks can also + be applied to neighboring ISPs. An interconnection agreement might + be written between two companies requiring that network ingress + filtering policy be implemented on all customer connections. ISPs + might, for example, mark datagrams from neighboring ISPs that do not + sign such a contract or demonstrably do not behave in accordance with + it as 'untrusted'. Alternatively, the ISP might place untrusted + prefixes into a separate BGP community [RFC4271] and use that to + advertise the level of trust to its BGP peers. + + In this case, uRPF is less effective as a validation tool, due to + asymmetric routing. However, when it can be shown that spoofed + addresses are present, the procedure can be applied. + + Part of the complication here is that in the abstract, it is very + difficult to know what addresses should appear in packets sent from + one ISP to another. Hence, packet-level filtering and enforcement + are very difficult at this point in the network. Whether one views + this as specific to the NNI, or a general property of the Internet, + it is still a major factor that needs to be taken into account. + +4.1.6. Cable Modem Subscriber Access + + Cable Modem Termination Systems (CMTS) employ Data Over Cable Service + Interface Specification (DOCSIS) Media Access Control (MAC) domains. + These share some properties with general switched networks, as + described above in Section 4.1.1, and some properties with DSL access + networks, as described below in Section 4.1.7. They also often have + their own provisioning and monitoring tools that may address some of + the issues described here. + +4.1.7. DSL Subscriber Access + + While DSL subscriber access can be bridged or routed, as seen by the + service provider's device, it is generally the case that the + protocols carry enough information to validate which subscriber is + sending packets. Thus, for ensuring that one DSL subscriber does not + spoof another, enforcement can generally be done at the aggregation + router. This is true even when there is a bridged infrastructure + among the subscribers, as DSL access generally requires all + subscriber traffic to go through the access aggregation router. + + + + + + + + +McPherson, et al. Informational [Page 15] + +RFC 6959 SAVI Threat Scope May 2013 + + + If it is desirable to provide spoofing protection among the devices + within a residence, that would need to be provided by the CPE device, + as the ISP's router does not have enough visibility to do that. It + is not clear at this time that this problem is seen as a relevant + threat. + +4.2. Currently Available Tools + + There are a number of tools that have been developed, and have seen + some deployment, for addressing these attacks. + +4.2.1. BCP 38 + + If BCP 38 [RFC2827] is implemented in LAN segments, it is typically + done so on subnetwork boundaries and traditionally relates only to + network-layer ingress filtering policies. The result is that hosts + within the segment cannot spoof packets from address space outside of + the local segment itself; however, they may still spoof packets using + sources' addresses that exist within the local network segment. + +4.2.2. Unicast RPF + + Unicast RPF is a crude mechanism to automate definition of BCP 38 + style filters based on routing table information. Its applicability + parallels that of BCP 38, although deployment caveats exist, as + outlined in [RFC3704]. + +4.2.3. Port-Based Address Binding + + Much of the work of SAVI is initially targeted at minimizing source + address spoofing in the LAN. In particular, if mechanisms can be + defined to accommodate configuration of port binding information for + IP, either to a port, to an unchangeable or authenticated MAC + address, or to other credentials in the packet such that an impostor + cannot create the needed values, a large portion of the spoofing + threat space in the LAN can be marginalized. + + However, establishing this binding is not trivial and varies across + both topology types and address allocation mechanisms. + +4.2.3.1. Manual Binding + + Binding of a single link-layer and network-layer address to a port + may initially seem trivial. However, two primary areas exist that + can complicate such techniques. In particular, these areas involve + topologies where more than a single IP-layer address may be + associated with a MAC address on a given port, or where multiple + hosts are connected via a single physical port. Furthermore, if one + + + +McPherson, et al. Informational [Page 16] + +RFC 6959 SAVI Threat Scope May 2013 + + + or more dynamic address allocation mechanisms such as DHCP are + employed, then some mechanism must exist to associate those IP-layer + addresses with the appropriate link-layer ports as addresses are + allocated or reclaimed. + +4.2.3.2. Automated Binding + + For IPv4, the primary and very widely used automated address + assignment technique is DHCP-based address assignment. This can be + coupled with filtering policies that control which hosts can + originate DHCP replies. Under such circumstances, SAVI switches can + treat DHCP replies as authoritative sources of IP address binding + information. By eavesdropping on the DHCP exchanges, the SAVI switch + can create the bindings needed for address usage enforcement. + + For IPv6, there are two common automated address assignment + techniques. While there are many variations and details, for + purposes of understanding the threats and basic responses, these are + Stateless Address Autoconfiguration (SLAAC) and DHCP-based IPv6 + address assignment. For DHCP-based IPv6 address assignment, the + techniques above are applicable and suitable. + + When SLAAC is used for IPv6 address assignment, the switches can + observe the duplicate address detection messages and use those to + create the enforcement bindings. This enables the switches to ensure + that only properly claimed IP addresses are used for data traffic. + It does not enforce that these addresses are assigned to the hosts, + since SLAAC does not have a notion of address assignment. + +4.2.3.3. IEEE 802.1x + + IEEE 802.1x is an authentication protocol that permits a network to + determine the identity of a user seeking to join it and apply + authorization rules to permit or deny the action. In and of + themselves, such tools confirm only that the user is authorized to + use the network, but they do not enforce what IP address the user is + allowed to use. It is worth noting that elements of 802.1x may well + be useful as binding anchors for SAVI solutions. + +4.2.4. Cryptographic Techniques + + MITM and replay attacks can typically be mitigated with cryptographic + techniques. However, many of the applications today either don't or + can't employ cryptographic authentication and protection mechanisms. + ARP for IPv4 does not use such protection. While Secure Neighbor + Discovery (SEND) provides such protection for the IPv6 ND protocol, + SEND is not widely used to date. Usage of such techniques is outside + the scope of this document. + + + +McPherson, et al. Informational [Page 17] + +RFC 6959 SAVI Threat Scope May 2013 + + + While DNSSEC will significantly help protect DNS from the effects of + spoof-based poisoning attacks, such protection does not help protect + the rest of the network from spoofed attacks. + +4.2.5. Residual Attacks + + It should be understood that not all combinations of network, + service, and enforcement choices will result in a protectable + network. For example, if one uses conventional SLAAC in a switched + network, but tries to only provide address enforcement on the routers + on the network, then the ability to provide protection is severely + limited. + +5. Topological Challenges Facing SAVI + + As noted previously, topological components and address allocation + mechanisms have significant implications on what is feasible with + regard to link-layer address and IP address port bindings. The + following sections discuss some of the various topologies and address + allocation mechanisms that proposed SAVI solutions should attempt to + address. + +5.1. Address Provisioning Mechanisms + + In a strictly static environment, configuration management for access + filters that map link-layer and network-layer addresses on a specific + switch port might be a viable option. However, most networks, + certainly those that accommodate actual human users, are much more + dynamic in nature. As such, mechanisms that provide port-MAC-IP + bindings need to accommodate dynamic address allocation schemes + enabled by protocols such as DHCP, DHCPv6 for address allocation, and + IPv6 Stateless Address Autoconfiguration. + +5.2. LAN Devices with Multiple Addresses + + From the perspective of network topology, consider hosts connected to + switch ports that may have one or more IP addresses, and devices that + forward packets from other network segments. It is much harder to + enforce port-MAC-IP bindings on traffic from such hosts and devices + than for traffic from more simply connected devices. + +5.2.1. Routers + + Routers are the most obvious examples of devices for which it is + problematic to implement port-MAC-IP bindings. Routers not only + originate packets themselves and often have multiple interfaces, but + also forward packets from other network segments. As a result, it's + + + + +McPherson, et al. Informational [Page 18] + +RFC 6959 SAVI Threat Scope May 2013 + + + difficult for port-MAC-IP binding rules to be established a priori, + because it's likely that many addresses and IP subnets should be + associated with the port-MAC in question. + +5.2.2. NATs + + Validating traffic from prefix-based and multi-address NATs is also + problematic, for the same reasons as for routers. Because they may + forward traffic from an array of addresses, validation requires + advance knowledge of the IPs that should be associated with a given + port-MAC pair. + +5.2.3. Multi-instance Hosts + + Another example that introduces complexities is that of multi- + instance hosts attached to a switch port. These are single physical + devices that internally run multiple physical or logical hosts. When + the device is a blade server, e.g., with internal blades each hosting + a physical machine, there is essentially a physical switch inside the + blade server. While feasible, this creates some complexity for + determining where enforcement logic can or should live. + + Logically distinct hosts, such as are provided by many varieties of + virtualization logic, result in a single physical host and connect to + a single port on the Ethernet switch in the topology, actually having + multiple internal virtual machines. Each virtual machine may have + its own IP and MAC addresses. These are connected by what is + essentially (or sometimes literally) an internal LAN switch. While + this internal switch may be a SAVI enforcement point to help control + threats among the virtual hosts, or between virtual hosts and other + parts of the network, such enforcement cannot be counted on in all + implementations. If the virtual machines are interconnected by the + internal switch, then that logical device is the first switch for the + purposes of this analysis. + + A further complication with multi-instance hosts is that in many + environments, these hosts may move while retaining their IP + addresses. This can be an actual relocation of the running software, + or a backup instance taking over the functions of the software. In + both cases, the IP address will appear at a new topological location. + Depending upon the protocols used, it may have the same MAC address + or a different one, and the system may or may not issue a gratuitous + ARP request after relocation. When such a move is done without + changing the MAC address, the SAVI switches will need to update their + state. While ARP may be helpful, traffic detection, switch-based + neighbor solicitation, interaction with an orchestration system, or + other means may be used. + + + + +McPherson, et al. Informational [Page 19] + +RFC 6959 SAVI Threat Scope May 2013 + + +5.2.4. Multi-LAN Hosts + + Multi-interface hosts, in particular those that are multihomed and + may forward packets from any of a number of source addresses, can be + problematic as well. In particular, if a port-MAC-IP binding is made + on each of the interfaces, and then either a loopback IP or the + address of a third interface is used as the source address of a + packet forwarded through an interface for which the port-MAC-IP + binding doesn't map, the traffic may be discarded. Static + configuration of port-MAC-IP bindings may accommodate this scenario, + although some a priori knowledge of address assignment and topology + is required. + + While it is rare to use loopback addressing or to send packets out of + one interface with the source address of another, these rarities do + legitimately occur. Some servers, particularly ones that have + underlying virtualization, use loopback techniques for management. + +5.2.5. Firewalls + + Firewalls that forward packets from other network segments, or serve + as a source for locally originated packets, suffer from the same + issues as routers. + +5.2.6. Mobile IP + + Mobile IP hosts in both IPv4 and IPv6 are proper members of the site + where they are currently located. Their care-of address is a + properly assigned address that is on the link they are using, and + their packets are sent and received using that address. Thus, they + do not introduce any additional complications. (There was at one + time consideration of allowing mobile hosts to use their home address + when away from home. This was not done, precisely to ensure that + mobile hosts comply with source address validity requirements.) + Mobile hosts with multiple physical interfaces fall into the cases + above. + + Mobile IP Home Agents (HAs) are somewhat more interesting. Although + they are (typically) fixed devices, they are required to send and + receive packets addressed from or to any currently properly + registered mobile node. From an analysis point of view, even though + the packets that an HA handles are actually addressed to or from the + link the HA is on, it is probably best to think of them as routers, + with a virtual interface to the actual hosts they are serving. Thus, + if the Mobile IP HA is trusted, it can itself perform IP source + address checking on the packets it forwards on behalf of mobile + nodes. This would utilize bindings established by the Mobile IP + registration mechanisms. + + + +McPherson, et al. Informational [Page 20] + +RFC 6959 SAVI Threat Scope May 2013 + + +5.2.7. Other Topologies + + Any topology that results in the possibility that a device connected + to a switch port may forward packets with more than a single source + address for a packet that it originated may be problematic. + Additionally, address allocation schemas introduce additional + considerations when examining a given SAVI solutions space. + +5.3. IPv6 Considerations + + IPv6 introduces additional capabilities that indirectly complicate + the spoofing analysis. IPv6 introduces and recommends the use of + SLAAC [RFC4862]. This allows hosts to determine their IP prefix, + select an Interface Identifier (IID), and then start communicating. + While there are many advantages to this, the absence of control + interactions complicates the process of behavioral enforcement. + + An additional complication is the very large IID space. Again, this + 64-bit IID space provided by IPv6 has many advantages. It provides + the opportunity for many useful behaviors. However, it also means + that in the absence of controls, hosts can mint anonymous addresses + as often as they like, modulo the idiosyncrasies of the duplicate + address procedure. Like many behaviors, this is a feature for some + purposes and a problem for others. For example, without claiming the + entire IID space, an on-link attacker may be able to generate enough + IP addresses to fill the Neighbor Discovery table space of the other + Layer 3 (L3) devices on the link, including switches that are + monitoring L3 behavior. This could seriously interfere with the + ability of other devices on the link to function. + +6. Analysis of Host Granularity Anti-spoofing + + Applying anti-spoofing techniques at the host level enables a site to + achieve several valuable objectives. While it is likely the case + that for many site topologies and policies full source spoofing + protection is not possible, it is also true that for many sites there + are steps that can be taken that provide benefit. + + One important class of benefit is masquerade prevention. Security + threats involving one machine masquerading as another, for example, + in order to hijack an apparently secure session, can occur within a + site with significant impact. Having mechanisms such that host- + facing devices prevent this is a significant intra-site security + improvement. Given that security experts report that most security + breaches are internal, this can be valuable. One example of this is + that such techniques should mitigate internal attacks on the site + routing system. + + + + +McPherson, et al. Informational [Page 21] + +RFC 6959 SAVI Threat Scope May 2013 + + + A second class of benefit is related to the traceability described + above. When a security incident is detected, either within a site or + externally (and traced to the site), it can be critical to determine + the actual source of the incident. If address usage can be tied to + the kinds of anchors described earlier, this can help in responding + to security incidents. + + In addition to these local observable benefits, there can be more + global benefits. For example, if address usage is tied to anchors, + it may be possible to prevent or control the use of large numbers of + anonymous IPv6 addresses for attacks, or at least to trace even those + attacks back to their source. + + As described below in the security considerations, these operational + behaviors need to be evaluated in the context of the reduction in + user privacy implied if one logs traffic bindings. In particular, in + addition to the architectural trade-offs, the network administrator + must plan for the proper handling of this relevant privacy + information about his users. + +7. Security Considerations + + This document provides limited discussion of some security threats + that source address validation improvements will help to mitigate. + It is not meant to be all-inclusive, either from a threat analysis + perspective or from the source address validation application side. + + It is seductive to think of SAVI solutions as providing the ability + to use this technology to trace a datagram to the person, or at least + end system, that originated it. For several reasons, the technology + can be used to derive circumstantial evidence, but does not actually + solve that problem. + + In the Internet layer, the source address of a datagram should be the + address of the system that originated it and to which any reply is + expected to come. But systems fall into several broad categories. + Many are single-user systems, such as laptops and PDAs. Multi-user + systems are commonly used in industry, and a wide variety of + middleware systems and application servers have no users at all, but + by design relay messages or perform services on behalf of users of + other systems (e.g., SMTP and peer-to-peer file sharing). + + Even if every Internet-connected network implements source address + validation at the ultimate network ingress, and assurances exist that + intermediate devices are to never modify datagram source addresses, + source addresses cannot be used as an authentication mechanism. The + + + + + +McPherson, et al. Informational [Page 22] + +RFC 6959 SAVI Threat Scope May 2013 + + + only techniques for unquestionably validating source addresses of + a received datagram are cryptographic authentication mechanisms + such as IPsec. + + It must be presumed that there will be some failure modes in any SAVI + deployment, given the history of technical security mechanisms. A + possible attack to be considered by network administrators is an + inside attack probing the network for modes of spoofing that can be + accomplished. If the probes are conducted at a level below alarm + thresholds, this might allow an internal attacker to safely determine + what spoof modes he can use. Thus, the use of these techniques must + be managed in such a way as to avoid giving a false sense of security + to the network administrator. + +7.1. Privacy Considerations + + It should be understood that enforcing and recording IP address + bindings have privacy implications. In some circumstances, this + binding data may be considered to be personally identifying + information. In general, collecting private information about users + brings ethical and legal responsibilities to the network + administrator. + + For this reason, collection and retention of logged binding + information need to be considered carefully. Prevention of spoofing + does not in itself require such retention. Analysis of immediate + events may rely on having logs of current bindings. Thus, privacy + issues can be ameliorated by removing binding logs after the binding + lifetimes expire. Logs of apparent spoof attempts are a separate + matter and may require longer retention to detect patterns of + deliberate or accidental abuse. + + With operations of the type described here, the network administrator + is collecting information about where on his network the user is + active. In addition, the recorded bindings supplement address usage + information about users that is available from DHCP logs. For + example, if IPv6 SLAAC is being used, and IP to Layer 2 address + bindings are being logged, the administrator will have access to + information associating users with their IP addresses even if IPv6 + privacy addresses are used. + + In addition to this, care must be taken in attributing actions to + users on the basis of this sort of information. Whatever the + theoretical strength of the tools, administrators should always allow + for such information being wrong and should be careful about any + actions taken on the basis of apparent attribution. These techniques + do nothing about address spoofing from other sites, so any evaluation + of attribution also needs to allow for such cases. + + + +McPherson, et al. Informational [Page 23] + +RFC 6959 SAVI Threat Scope May 2013 + + +8. Acknowledgments + + A portion of the primer text in this document came directly from + [SAVA], authored by Fred Baker and Ralph Droms. Many thanks to + Christian Vogt, Suresh Bhogavilli, and Pekka Savola for contributing + text and a careful review of this document. + +9. References + +9.1. Normative References + + [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", RFC 2460, December 1998. + +9.2. Informative References + + [IEEE802.1AX] + IEEE, "IEEE Standard for Local and metropolitan area + networks - Link Aggregation", IEEE 802.1AX, 2008. + + [RFC0826] Plummer, D., "Ethernet Address Resolution Protocol: Or + converting network protocol addresses to 48.bit Ethernet + address for transmission on Ethernet hardware", STD 37, + RFC 826, November 1982. + + [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: + Defeating Denial of Service Attacks which employ IP Source + Address Spoofing", BCP 38, RFC 2827, May 2000. + + [RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed + Networks", BCP 84, RFC 3704, March 2004. + + [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway + Protocol 4 (BGP-4)", RFC 4271, January 2006. + + [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, + "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, + September 2007. + + [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless + Address Autoconfiguration", RFC 4862, September 2007. + + [RFC4953] Touch, J., "Defending TCP Against Spoofing Attacks", + RFC 4953, July 2007. + + + + +McPherson, et al. Informational [Page 24] + +RFC 6959 SAVI Threat Scope May 2013 + + + [SAVA] Baker, F. and R. Droms, "IPv4/IPv6 Source Address + Verification", Work in Progress, June 2007. + + [VRSN-REPORT] + Silva, K., Scalzo, F., and P. Barber, "Anatomy of Recent + DNS Reflector Attacks from the Victim and Reflector Point + of View", VeriSign White Paper, April 2006. + +Authors' Addresses + + Danny McPherson + VeriSign, Inc. + + EMail: dmcpherson@verisign.com + + + Fred Baker + Cisco Systems + + EMail: fred@cisco.com + + + Joel M. Halpern + Ericsson + + EMail: joel.halpern@ericsson.com + + + + + + + + + + + + + + + + + + + + + + + + + +McPherson, et al. Informational [Page 25] + |