summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9288.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9288.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9288.txt')
-rw-r--r--doc/rfc/rfc9288.txt1866
1 files changed, 1866 insertions, 0 deletions
diff --git a/doc/rfc/rfc9288.txt b/doc/rfc/rfc9288.txt
new file mode 100644
index 0000000..abcfcf4
--- /dev/null
+++ b/doc/rfc/rfc9288.txt
@@ -0,0 +1,1866 @@
+
+
+
+
+Internet Engineering Task Force (IETF) F. Gont
+Request for Comments: 9288 SI6 Networks
+Category: Informational W. Liu
+ISSN: 2070-1721 Huawei Technologies
+ August 2022
+
+
+ Recommendations on the Filtering of IPv6 Packets Containing IPv6
+ Extension Headers at Transit Routers
+
+Abstract
+
+ This document analyzes the security implications of IPv6 Extension
+ Headers and associated IPv6 options. Additionally, it discusses the
+ operational and interoperability implications of discarding packets
+ based on the IPv6 Extension Headers and IPv6 options they contain.
+ Finally, it provides advice on the filtering of such IPv6 packets at
+ transit routers for traffic not directed to them, for those cases
+ where such filtering is deemed as necessary.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9288.
+
+Copyright Notice
+
+ Copyright (c) 2022 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Terminology and Assumptions Employed in This Document
+ 2.1. Terminology
+ 2.2. Applicability Statement
+ 2.3. Router Default Behavior and Features
+ 3. IPv6 Extension Headers
+ 3.1. General Discussion
+ 3.2. General Security Implications
+ 3.3. Rationale for Our Advice on the Handling of IPv6 Packets
+ with Specific IPv6 Extension Headers
+ 3.4. Summary of Advice on the Handling of IPv6 Packets with
+ Specific IPv6 Extension Headers
+ 3.5. Advice on the Handling of IPv6 Packets with Specific IPv6
+ Extension Headers
+ 3.6. Advice on the Handling of Packets with Unknown IPv6
+ Extension Headers
+ 4. IPv6 Options
+ 4.1. General Discussion
+ 4.2. General Security Implications of IPv6 Options
+ 4.3. Summary of Advice on the Handling of IPv6 Packets with
+ Specific IPv6 Options
+ 4.4. Advice on the Handling of Packets with Specific IPv6
+ Options
+ 4.5. Advice on the Handling of Packets with Unknown IPv6 Options
+ 5. IANA Considerations
+ 6. Privacy Considerations
+ 7. Security Considerations
+ 8. References
+ 8.1. Normative References
+ 8.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ IPv6 Extension Headers (EHs) allow for the extension of the IPv6
+ protocol and provide support for core functionality, such as IPv6
+ fragmentation. However, common implementation limitations suggest
+ that EHs present a challenge for IPv6 packet routing equipment,
+ particularly when the IPv6 header chain needs to be processed for, as
+ an example, enforcing Access Control Lists (ACLs) or implementing
+ other functions [RFC9098].
+
+ Several studies (e.g., [Huston-2022], [JAMES], and [RFC7872]) suggest
+ that there is widespread dropping of IPv6 packets that contain IPv6
+ EHs. In some cases, such packet drops occur at transit routers.
+ While some operators are known to intentionally drop packets that
+ contain IPv6 EHs, it is possible that some of the measured packet
+ drops are the result of inappropriate advice in this area.
+
+ This document analyzes both the general security implications of IPv6
+ EHs, as well as the security implications of specific EH and option
+ types. It also provides advice on the filtering of IPv6 packets
+ based on the IPv6 EHs and the IPv6 options they contain. Since
+ various protocols may use IPv6 EHs (possibly with IPv6 options),
+ discarding packets based on the IPv6 EHs or IPv6 options they contain
+ can have implications on the proper functioning of such protocols.
+ Thus, this document also attempts to discuss the operational and
+ interoperability implications of such filtering policies.
+
+ The resulting packet filtering policy typically depends on where in
+ the network such policy is enforced. When the policy is enforced in
+ a transit network, the policy typically follows a "deny-list"
+ approach, where only packets with clear negative implications are
+ dropped. On the other hand, when the policy is enforced closer to
+ the destination systems, the policy typically follows an "accept-
+ list" approach, where only traffic that is expected to be received is
+ allowed. The advice in this document is aimed only at transit
+ routers that may need to enforce a filtering policy based on the IPv6
+ EHs and IPv6 options a packet may contain, following a "deny-list"
+ approach; hence, it is likely to be much more permissive than a
+ filtering policy to be employed at, for example, the edge of an
+ enterprise network. The advice in this document is meant to improve
+ the current situation of the dropping of packets with IPv6 EHs in the
+ Internet [RFC7872] in such cases where packets are being dropped due
+ to inappropriate or missing guidelines.
+
+ This document is similar in nature to [RFC7126], which addresses the
+ same problem for the IPv4 case. However, in IPv6, the problem space
+ is compounded by the fact that IPv6 specifies a number of IPv6 EHs
+ and a number of IPv6 options that may be valid only when included in
+ specific EH types.
+
+ This document completes and complements the considerations for
+ protecting the control plane from packets containing IP options that
+ can be found in [RFC6192].
+
+ Section 2 specifies the terminology and conventions employed
+ throughout this document. Section 3 discusses IPv6 EHs and provides
+ advice in the area of filtering IPv6 packets that contain such IPv6
+ EHs. Section 4 discusses IPv6 options and provides advice in the
+ area of filtering IPv6 packets that contain such options.
+
+2. Terminology and Assumptions Employed in This Document
+
+2.1. Terminology
+
+ The terms "permit" (allow the traffic), "drop" (drop with no
+ notification to sender), and "reject" (drop with appropriate
+ notification to sender) are employed as defined in [RFC3871].
+ Throughout this document, we also employ the term "discard" as a
+ generic term to indicate the act of discarding a packet, irrespective
+ of whether the sender is notified of such a drop and whether the
+ specific filtering action is logged.
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+2.2. Applicability Statement
+
+ This document provides advice on the filtering of IPv6 packets with
+ EHs at transit routers for traffic not explicitly destined to them,
+ for cases in which such filtering is deemed as necessary.
+
+2.3. Router Default Behavior and Features
+
+ This document assumes that nodes comply with the requirements in
+ [RFC7045]. Namely,
+
+ | If a forwarding node discards a packet containing a standard IPv6
+ | extension header, it MUST be the result of a configurable policy
+ | and not just the result of a failure to recognise such a header.
+ | This means that the discard policy for each standard type of
+ | extension header MUST be individually configurable. The default
+ | configuration SHOULD allow all standard extension headers.
+
+ The advice provided in this document is only meant to guide an
+ operator in configuring forwarding devices and is not to be
+ interpreted as advice regarding default configuration settings for
+ network devices. That is, this document provides advice with respect
+ to operational policies but does not change the implementation
+ defaults required by [RFC7045].
+
+ We recommend that configuration options be made available to govern
+ the processing of each IPv6 EH type and each IPv6 Option Type. Such
+ configuration options should include the following possible settings:
+
+ * Permit this IPv6 EH or IPv6 Option Type.
+
+ * Drop packets containing this IPv6 EH or IPv6 Option Type.
+
+ * Reject packets containing this IPv6 EH or IPv6 Option Type (where
+ the packet drop is signaled with an ICMPv6 error message).
+
+ * Rate-limit traffic containing this IPv6 EH or IPv6 Option Type.
+
+ * Ignore this IPv6 EH or IPv6 Option Type (as if it was not
+ present), and process the packet according the rules for the
+ remaining headers. We note that if a packet carries forwarding
+ information (e.g., in an IPv6 Routing Header (RH)), this might be
+ an inappropriate or undesirable action.
+
+ We note that special care needs to be taken when devices log packet
+ drops/rejects. Devices should count the number of packets dropped/
+ rejected, but the logging of drop/reject events should be limited so
+ as to not overburden device resources.
+
+ Finally, we note that when discarding packets, it is generally
+ desirable that the sender be signaled of the packet drop, since this
+ is of use for trouble-shooting purposes. However, throughout this
+ document (when recommending that packets be discarded), we
+ generically refer to the action as "discard" without specifying
+ whether the sender is signaled of the packet drop.
+
+3. IPv6 Extension Headers
+
+3.1. General Discussion
+
+ IPv6 EHs [RFC8200] allow for the extension of the IPv6 protocol.
+ Since both IPv6 EHs and upper-layer protocols share the same
+ namespace ("Next Header" registry/namespace), [RFC7045] identifies
+ which of the currently assigned Internet Protocol numbers identify
+ IPv6 EHs vs. upper-layer protocols. This document discusses the
+ filtering of packets based on the IPv6 EHs (as specified by
+ [RFC7045]) they contain.
+
+ [RFC8200] specifies that non-fragmented IPv6 datagrams and IPv6
+ First-Fragments must contain the entire IPv6 header chain [RFC7112].
+ Therefore, intermediate systems can enforce the filtering policies
+ discussed in this document or resort to simply discarding the
+ offending packets when they fail to include the entire IPv6 header
+ chain [RFC8200].
+
+ We note that in order to implement filtering rules on the fast path,
+ it may be necessary for the filtering device to limit the depth into
+ the packet that can be inspected before giving up. In circumstances
+ where such a limitation exists, it is recommended that
+ implementations provide a configuration option that specifies whether
+ to discard packets if the aforementioned limit is encountered.
+ Operators may then determine, according to their own circumstances,
+ how such packets will be handled.
+
+3.2. General Security Implications
+
+ In some device architectures, IPv6 packets that contain IPv6 EHs can
+ cause the corresponding packets to be processed on the slow path and,
+ hence, may be leveraged for the purpose of Denial-of-Service (DoS)
+ attacks [RFC9098] [Cisco-EH] [FW-Benchmark].
+
+ Operators are urged to consider the IPv6 EH and IPv6 options handling
+ capabilities of their devices as they make deployment decisions in
+ the future.
+
+3.3. Rationale for Our Advice on the Handling of IPv6 Packets with
+ Specific IPv6 Extension Headers
+
+ * IPv6 packets with IPv6 Extension Headers (or options) that are not
+ expected to traverse transit routers should be dropped.
+
+ * IPv6 packets with IPv6 Extension Headers (or options) that are
+ only expected to traverse transit routers when a specific
+ technology is employed should be permitted (or dropped) based on
+ the knowledge regarding the use of such technology in the transit
+ provider in question (i.e., permit the packets if the technology
+ is employed, or drop them).
+
+ * IPv6 packets with IPv6 Extension Headers (or options) that
+ represent a concrete attack vector to network infrastructure
+ devices should be dropped.
+
+ * IPv6 packets with any other IPv6 Extension Headers (or options)
+ should be permitted. This is an intentional trade-off made to
+ minimize ossification.
+
+3.4. Summary of Advice on the Handling of IPv6 Packets with Specific
+ IPv6 Extension Headers
+
+ This section summarizes the advice provided in Section 3.5, providing
+ references to the specific sections in which a detailed analysis can
+ be found.
+
+ +=====================+=========================+===========+
+ | EH Type | Filtering Policy | Reference |
+ +=====================+=========================+===========+
+ | Hop-by-Hop Options | Drop or Ignore | Section |
+ | Header (Proto=0) | | 3.5.1 |
+ +---------------------+-------------------------+-----------+
+ | Routing Header | Drop only Routing Type | Section |
+ | (Proto=43) | 0, Routing Type 1, and | 3.5.2 |
+ | | Routing Type 3. Permit | |
+ | | other Routing Types | |
+ +---------------------+-------------------------+-----------+
+ | Fragment Header | Permit | Section |
+ | (Proto=44) | | 3.5.3 |
+ +---------------------+-------------------------+-----------+
+ | Encapsulating | Permit | Section |
+ | Security Payload | | 3.5.4 |
+ | (Proto=50) | | |
+ +---------------------+-------------------------+-----------+
+ | Authentication | Permit | Section |
+ | Header (Proto=51) | | 3.5.5 |
+ +---------------------+-------------------------+-----------+
+ | Destination Options | Permit | Section |
+ | Header(Proto=60) | | 3.5.6 |
+ +---------------------+-------------------------+-----------+
+ | Mobility Header | Permit | Section |
+ | (Proto=135) | | 3.5.7 |
+ +---------------------+-------------------------+-----------+
+ | Host Identity | Permit | Section |
+ | Protocol | | 3.5.8 |
+ | (Proto=139) | | |
+ +---------------------+-------------------------+-----------+
+ | Shim6 Protocol | Permit | Section |
+ | (Proto=140) | | 3.5.9 |
+ +---------------------+-------------------------+-----------+
+ | Use for | Drop | Section |
+ | experimentation and | | 3.5.10 |
+ | testing (Proto=253 | | |
+ | and 254) | | |
+ +---------------------+-------------------------+-----------+
+
+ Table 1: Summary of Advice on the Handling of IPv6
+ Packets with Specific IPv6 Extension Headers
+
+3.5. Advice on the Handling of IPv6 Packets with Specific IPv6
+ Extension Headers
+
+3.5.1. IPv6 Hop-by-Hop Options (Protocol Number=0)
+
+3.5.1.1. Uses
+
+ The Hop-by-Hop (HBH) Options header is used to carry optional
+ information that may be examined by every node along a packet's
+ delivery path. It is expected that nodes will examine the Hop-by-Hop
+ Options header if explicitly configured to do so.
+
+ | NOTE: A previous revision of the IPv6 core specification
+ | [RFC2460] originally required all nodes to examine and process
+ | the Hop-by-Hop Options header. However, even before the
+ | publication of [RFC8200], a number of implementations already
+ | provided the option of ignoring this header unless explicitly
+ | configured to examine it.
+
+3.5.1.2. Specification
+
+ This EH is specified in [RFC8200]. As of May 2022, the following
+ options have been specified for the Hop-by-Hop Options header:
+
+ * Type 0x00: Pad1 [RFC8200]
+
+ * Type 0x01: PadN [RFC8200]
+
+ * Type 0x05: Router Alert [RFC2711]
+
+ * Type 0x07: CALIPSO [RFC5570]
+
+ * Type 0x08: SMF_DPD [RFC6621]
+
+ * Type 0x23: RPL Option [RFC9008]
+
+ * Type 0x26: Quick-Start [RFC4782]
+
+ * Type 0x4D: (Deprecated)
+
+ * Type 0x63: RPL Option [RFC6553]
+
+ * Type 0x6D: MPL Option [RFC7731]
+
+ * Type 0x8A: Endpoint Identification (Deprecated) [NIMROD-EID]
+
+ * Type 0xC2: Jumbo Payload [RFC2675]
+
+ * Type 0xEE: IPv6 DFF Header [RFC6971]
+
+ * Type 0x1E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x3E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x5E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x7E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x9E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xBE: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xDE: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xFE: RFC3692-style Experiment [RFC4727]
+
+3.5.1.3. Specific Security Implications
+
+ Legacy nodes that process this extension header might be subject to
+ DoS attacks.
+
+ | NOTE: While [RFC8200] has removed the requirement for all nodes
+ | to examine and process the Hop-by-Hop Options header, the
+ | deployed base may still reflect the legacy [RFC2460] behavior
+ | for a while; hence, the potential security problems of this EH
+ | are still of concern.
+
+3.5.1.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets containing a Hop-by-Hop Options header would break
+ any of the protocols that rely on it for proper functioning. For
+ example, it would break RSVP [RFC2205] and multicast deployments and
+ would cause IPv6 jumbograms to be discarded.
+
+3.5.1.5. Advice
+
+ Nodes implementing [RFC8200] would already ignore this extension
+ header unless explicitly required to process it. For legacy nodes
+ [RFC2460], the recommended configuration for the processing of these
+ packets depends on the features and capabilities of the underlying
+ platform, the configuration of the platform, and also the deployment
+ environment of the platform. On platforms that allow the forwarding
+ of packets with IPv6 HBH Options headers on the fast path, we
+ recommend that packets with IPv6 HBH Options headers be forwarded as
+ normal. Otherwise, on platforms in which the processing of packets
+ with IPv6 HBH Options headers is carried out in the slow path and an
+ option is provided to rate-limit these packets, we recommend that
+ this option be selected. Finally, when packets containing IPv6 HBH
+ Options headers are processed in the slow path and the underlying
+ platform does not have any mitigation options available for attacks
+ based on these packets, we recommend that such platforms discard
+ packets containing IPv6 HBH Options headers.
+
+ Finally, we note that the Routing Protocol for Low-Power and Lossy
+ Networks (RPL) routers [RFC6550] must not discard packets based on
+ the presence of an IPv6 Hop-by-Hop Options header, as this would
+ break the RPL.
+
+3.5.2. Routing Header (Protocol Number=43)
+
+3.5.2.1. Uses
+
+ The Routing Header is used by an IPv6 source to list one or more
+ intermediate nodes to be "visited" on the way to a packet's
+ destination.
+
+3.5.2.2. Specification
+
+ This EH is specified in [RFC8200]. The Routing Type 0 had originally
+ been specified in [RFC2460] and was later obsoleted by [RFC5095];
+ thus, it was removed from [RFC8200].
+
+ As of May 2022, the following Routing Types have been specified:
+
+ * Type 0: Source Route (DEPRECATED) [RFC2460] [RFC5095]
+
+ * Type 1: Nimrod (DEPRECATED)
+
+ * Type 2: Type 2 Routing Header [RFC6275]
+
+ * Type 3: RPL Source Route Header [RFC6554]
+
+ * Type 4: Segment Routing Header (SRH) [RFC8754]
+
+ * Types 5-252: Unassigned
+
+ * Type 253: RFC3692-style Experiment 1 [RFC4727]
+
+ * Type 254: RFC3692-style Experiment 2 [RFC4727]
+
+ * Type 255: Reserved
+
+3.5.2.3. Specific Security Implications
+
+ The security implications of Routing Headers of Routing Type 0 have
+ been discussed in detail in [Biondi-2007] and [RFC5095]. Routing
+ Type 1 was never widely implemented. The security implications of
+ Routing Headers of Routing Type 2, Routing Type 3, and Routing Type 4
+ (SRH) are discussed in [RFC6275], [RFC6554], and [RFC8754],
+ respectively.
+
+3.5.2.4. Operational and Interoperability Impact If Blocked
+
+ Blocking packets containing Routing Headers of Routing Type 0 or
+ Routing Type 1 has no operational implications, since both have been
+ deprecated. Blocking packets containing Routing Headers of Routing
+ Type 2 would break Mobile IPv6. Packets containing Routing Headers
+ of Routing Type 3 may be safely blocked at RPL domain boundaries,
+ since such headers are employed within a single RPL domain. Blocking
+ packets containing Routing Headers of Routing Type 4 (SRH) will break
+ Segment Routing (SR) deployments if the filtering policy is enforced
+ on packets being forwarded within an SR domain.
+
+3.5.2.5. Advice
+
+ Intermediate systems should discard packets containing Routing
+ Headers of Routing Type 0, Routing Type 1, or Routing Type 3. Other
+ Routing Types should be permitted, as required by [RFC7045].
+
+3.5.3. Fragment Header (Protocol Number=44)
+
+3.5.3.1. Uses
+
+ This EH provides the fragmentation and reassembly functionality for
+ IPv6.
+
+3.5.3.2. Specification
+
+ This EH is specified in [RFC8200].
+
+3.5.3.3. Specific Security Implications
+
+ The security implications of the Fragment Header range from DoS
+ attacks (e.g., based on flooding a target with IPv6 fragments) to
+ information leakage attacks [RFC7739].
+
+3.5.3.4. Operational and Interoperability Impact If Blocked
+
+ Blocking packets that contain a Fragment Header will break any
+ protocol that may rely on fragmentation (e.g., the DNS [RFC1034]).
+ However, IP fragmentation is known to introduce fragility to Internet
+ communication [RFC8900].
+
+3.5.3.5. Advice
+
+ Intermediate systems should permit packets that contain a Fragment
+ Header.
+
+3.5.4. Encapsulating Security Payload (Protocol Number=50)
+
+3.5.4.1. Uses
+
+ This EH is employed for the IPsec suite [RFC4303].
+
+3.5.4.2. Specification
+
+ This EH is specified in [RFC4303].
+
+3.5.4.3. Specific Security Implications
+
+ Besides the general implications of IPv6 EHs, this EH could be
+ employed to potentially perform a DoS attack at the destination
+ system by wasting CPU resources in validating the contents of the
+ packet.
+
+3.5.4.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that employ this EH would break IPsec deployments.
+
+3.5.4.5. Advice
+
+ Intermediate systems should permit packets containing the
+ Encapsulating Security Payload EH.
+
+3.5.5. Authentication Header (Protocol Number=51)
+
+3.5.5.1. Uses
+
+ The Authentication Header can be employed to provide authentication
+ services in IPv4 and IPv6.
+
+3.5.5.2. Specification
+
+ This EH is specified in [RFC4302].
+
+3.5.5.3. Specific Security Implications
+
+ Besides the general implications of IPv6 EHs, this EH could be
+ employed to potentially perform a DoS attack at the destination
+ system by wasting CPU resources in validating the contents of the
+ packet.
+
+3.5.5.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that employ this EH would break IPsec deployments.
+
+3.5.5.5. Advice
+
+ Intermediate systems should permit packets containing an
+ Authentication Header.
+
+3.5.6. Destination Options (Protocol Number=60)
+
+3.5.6.1. Uses
+
+ The Destination Options (DO) header is used to carry optional
+ information that needs be examined only by a packet's destination
+ node(s).
+
+3.5.6.2. Specification
+
+ This EH is specified in [RFC8200]. As of May 2022, the following
+ options have been specified for this EH:
+
+ * Type 0x00: Pad1 [RFC8200]
+
+ * Type 0x01: PadN [RFC8200]
+
+ * Type 0x04: Tunnel Encapsulation Limit [RFC2473]
+
+ * Type 0x0F: IPv6 Performance and Diagnostic Metrics (PDM) [RFC8250]
+
+ * Type 0x4D: (Deprecated)
+
+ * Type 0xC9: Home Address [RFC6275]
+
+ * Type 0x8A: Endpoint Identification (Deprecated) [NIMROD-EID]
+
+ * Type 0x8B: ILNP Nonce [RFC6744]
+
+ * Type 0x8C: Line-Identification Option [RFC6788]
+
+ * Type 0x1E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x3E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x5E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x7E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0x9E: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xBE: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xDE: RFC3692-style Experiment [RFC4727]
+
+ * Type 0xFE: RFC3692-style Experiment [RFC4727]
+
+3.5.6.3. Specific Security Implications
+
+ No security implications are known, other than the general security
+ implications of IPv6 EHs. For a discussion of possible security
+ implications of specific options specified for the DO header, please
+ see Section 4.4.
+
+3.5.6.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain a Destination Options header would
+ break protocols that rely on this EH type for conveying information
+ (such as the Identifier-Locator Network Protocol (ILNP) [RFC6740] and
+ Mobile IPv6 [RFC6275]), as well as IPv6 tunnels that employ the
+ Tunnel Encapsulation Limit option [RFC2473].
+
+3.5.6.5. Advice
+
+ Intermediate systems should permit packets that contain a Destination
+ Options header.
+
+3.5.7. Mobility Header (Protocol Number=135)
+
+3.5.7.1. Uses
+
+ The Mobility Header is an EH used by mobile nodes, correspondent
+ nodes, and home agents in all messaging related to the creation and
+ management of bindings in Mobile IPv6.
+
+3.5.7.2. Specification
+
+ This EH is specified in [RFC6275].
+
+3.5.7.3. Specific Security Implications
+
+ A thorough security assessment of the security implications of the
+ Mobility Header and related mechanisms can be found in Section 15 of
+ [RFC6275].
+
+3.5.7.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets containing this EH would break Mobile IPv6.
+
+3.5.7.5. Advice
+
+ Intermediate systems should permit packets that contain a Mobility
+ Header.
+
+3.5.8. Host Identity Protocol (Protocol Number=139)
+
+3.5.8.1. Uses
+
+ This EH is employed with the Host Identity Protocol (HIP), which is a
+ protocol that allows consenting hosts to securely establish and
+ maintain shared IP-layer state, allowing the separation of the
+ identifier and locator roles of IP addresses, thereby enabling
+ continuity of communications across IP address changes.
+
+3.5.8.2. Specification
+
+ This EH is specified in [RFC7401].
+
+3.5.8.3. Specific Security Implications
+
+ The security implications of the HIP header are discussed in detail
+ in Section 8 of [RFC7401].
+
+3.5.8.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain a HIP header would break HIP
+ deployments.
+
+3.5.8.5. Advice
+
+ Intermediate systems should permit packets that contain a HIP header.
+
+3.5.9. Shim6 Protocol (Protocol Number=140)
+
+3.5.9.1. Uses
+
+ This EH is employed by the Shim6 protocol [RFC5533].
+
+3.5.9.2. Specification
+
+ This EH is specified in [RFC5533].
+
+3.5.9.3. Specific Security Implications
+
+ The specific security implications are discussed in detail in
+ Section 16 of [RFC5533].
+
+3.5.9.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain this EH will break Shim6.
+
+3.5.9.5. Advice
+
+ Intermediate systems should permit packets containing this EH.
+
+3.5.10. Use for Experimentation and Testing (Protocol Numbers=253 and
+ 254)
+
+3.5.10.1. Uses
+
+ These IPv6 EHs are employed for performing RFC3692-style experiments
+ (see [RFC3692] for details).
+
+3.5.10.2. Specification
+
+ These EHs are specified in [RFC3692] and [RFC4727].
+
+3.5.10.3. Specific Security Implications
+
+ The security implications of these EHs will depend on their specific
+ use.
+
+3.5.10.4. Operational and Interoperability Impact If Blocked
+
+ For obvious reasons, discarding packets that contain these EHs limits
+ the ability to perform legitimate experiments across IPv6 routers.
+
+3.5.10.5. Advice
+
+ Operators should determine, according to their own circumstances,
+ whether to discard packets containing these EHs.
+
+3.6. Advice on the Handling of Packets with Unknown IPv6 Extension
+ Headers
+
+ We refer to IPv6 EHs that have not been assigned an Internet Protocol
+ number by IANA (and marked as such) in [IANA-PROTOCOLS] as "unknown
+ IPv6 Extension Headers" ("unknown IPv6 EHs").
+
+3.6.1. Uses
+
+ New IPv6 EHs may be specified as part of future extensions to the
+ IPv6 protocol.
+
+ Since IPv6 EHs and upper-layer protocols employ the same namespace,
+ it is impossible to tell whether an unknown Internet Protocol number
+ is being employed for an IPv6 EH or an upper-layer protocol.
+
+3.6.2. Specification
+
+ The processing of unknown IPv6 EHs is specified in [RFC7045].
+
+3.6.3. Specific Security Implications
+
+ For obvious reasons, it is impossible to determine specific security
+ implications of unknown IPv6 EHs.
+
+3.6.4. Operational and Interoperability Impact If Blocked
+
+ As noted in [RFC7045], discarding unknown IPv6 EHs may slow down the
+ deployment of new IPv6 EHs and transport protocols. The
+ corresponding IANA registry, which is [IANA-PROTOCOLS], should be
+ monitored such that filtering rules are updated as new IPv6 EHs are
+ standardized.
+
+ We note that since IPv6 EHs and upper-layer protocols share the same
+ numbering space, discarding unknown IPv6 EHs may result in packets
+ encapsulating unknown upper-layer protocols being discarded.
+
+3.6.5. Advice
+
+ Operators should determine, according to their own circumstances,
+ whether to discard packets containing unknown IPv6 EHs.
+
+4. IPv6 Options
+
+4.1. General Discussion
+
+ The following subsections describe specific security implications of
+ different IPv6 options and provide advice regarding filtering packets
+ that contain such options.
+
+4.2. General Security Implications of IPv6 Options
+
+ The general security implications of IPv6 options are closely related
+ to those discussed in Section 3.2 for IPv6 EHs. Essentially, packets
+ that contain IPv6 options might need to be processed by an IPv6
+ router's general-purpose CPU and, hence, could present a Distributed
+ Denial-of-Service (DDoS) risk to that router's general-purpose CPU
+ (and thus to the router itself). For some architectures, a possible
+ mitigation would be to rate-limit the packets that are to be
+ processed by the general-purpose CPU (see, e.g., [Cisco-EH]).
+
+4.3. Summary of Advice on the Handling of IPv6 Packets with Specific
+ IPv6 Options
+
+ This section summarizes the advice provided in Section 4.4, and it
+ includes references to the specific sections in which a detailed
+ analysis can be found.
+
+ +===============================+======================+===========+
+ | Option | Filtering Policy | Reference |
+ +===============================+======================+===========+
+ | Pad1 (Type=0x00) | Permit | Section |
+ | | | 4.4.1 |
+ +-------------------------------+----------------------+-----------+
+ | PadN (Type=0x01) | Permit | Section |
+ | | | 4.4.2 |
+ +-------------------------------+----------------------+-----------+
+ | Tunnel Encapsulation Limit | Permit | Section |
+ | (Type=0x04) | | 4.4.3 |
+ +-------------------------------+----------------------+-----------+
+ | Router Alert (Type=0x05) | Permit based on | Section |
+ | | needed functionality | 4.4.4 |
+ +-------------------------------+----------------------+-----------+
+ | CALIPSO (Type=0x07) | Permit based on | Section |
+ | | needed functionality | 4.4.5 |
+ +-------------------------------+----------------------+-----------+
+ | SMF_DPD (Type=0x08) | Permit based on | Section |
+ | | needed functionality | 4.4.6 |
+ +-------------------------------+----------------------+-----------+
+ | PDM Option (Type=0x0F) | Permit | Section |
+ | | | 4.4.7 |
+ +-------------------------------+----------------------+-----------+
+ | RPL Option (Type=0x23) | Permit | Section |
+ | | | 4.4.8 |
+ +-------------------------------+----------------------+-----------+
+ | Quick-Start (Type=0x26) | Permit | Section |
+ | | | 4.4.9 |
+ +-------------------------------+----------------------+-----------+
+ | Deprecated (Type=0x4D) | Drop | Section |
+ | | | 4.4.10 |
+ +-------------------------------+----------------------+-----------+
+ | MPL Option (Type=0x6D) | Permit | Section |
+ | | | 4.4.12 |
+ +-------------------------------+----------------------+-----------+
+ | Jumbo Payload (Type=0xC2) | Permit based on | Section |
+ | | needed functionality | 4.4.16 |
+ +-------------------------------+----------------------+-----------+
+ | RPL Option (Type=0x63) | Drop | Section |
+ | | | 4.4.11 |
+ +-------------------------------+----------------------+-----------+
+ | Endpoint Identification | Drop | Section |
+ | (Type=0x8A) | | 4.4.13 |
+ +-------------------------------+----------------------+-----------+
+ | ILNP Nonce (Type=0x8B) | Permit | Section |
+ | | | 4.4.14 |
+ +-------------------------------+----------------------+-----------+
+ | Line-Identification Option | Drop | Section |
+ | (Type=0x8C) | | 4.4.15 |
+ +-------------------------------+----------------------+-----------+
+ | Home Address (Type=0xC9) | Permit | Section |
+ | | | 4.4.17 |
+ +-------------------------------+----------------------+-----------+
+ | IP_DFF (Type=0xEE) | Permit based on | Section |
+ | | needed functionality | 4.4.18 |
+ +-------------------------------+----------------------+-----------+
+ | RFC3692-style Experiment | Permit based on | Section |
+ | (Types = 0x1E, 0x3E, 0x5E, | needed functionality | 4.4.19 |
+ | 0x7E, 0x9E, 0xBE, 0xDE, 0xFE) | | |
+ +-------------------------------+----------------------+-----------+
+
+ Table 2: Summary of Advice on the Handling of IPv6 Packets with
+ Specific IPv6 Options
+
+4.4. Advice on the Handling of Packets with Specific IPv6 Options
+
+ The following subsections contain a description of each of the IPv6
+ options that have so far been specified, a summary of the security
+ implications of each of such options, a discussion of possible
+ interoperability implications if packets containing such options are
+ discarded, and specific advice regarding whether packets containing
+ these options should be permitted.
+
+4.4.1. Pad1 (Type=0x00)
+
+4.4.1.1. Uses
+
+ This option is used when necessary to align subsequent options and to
+ pad out the containing header to a multiple of 8 octets in length.
+
+4.4.1.2. Specification
+
+ This option is specified in [RFC8200].
+
+4.4.1.3. Specific Security Implications
+
+ None.
+
+4.4.1.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain this option would potentially break
+ any protocol that relies on IPv6 options.
+
+4.4.1.5. Advice
+
+ Intermediate systems should not discard packets based on the presence
+ of this option.
+
+4.4.2. PadN (Type=0x01)
+
+4.4.2.1. Uses
+
+ This option is used when necessary to align subsequent options and to
+ pad out the containing header to a multiple of 8 octets in length.
+
+4.4.2.2. Specification
+
+ This option is specified in [RFC8200].
+
+4.4.2.3. Specific Security Implications
+
+ Because of the possible size of this option, it could be leveraged as
+ a large-bandwidth covert channel.
+
+4.4.2.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain this option would potentially break
+ any protocol that relies on IPv6 options.
+
+4.4.2.5. Advice
+
+ Intermediate systems should not discard IPv6 packets based on the
+ presence of this option.
+
+4.4.3. Tunnel Encapsulation Limit (Type=0x04)
+
+4.4.3.1. Uses
+
+ The Tunnel Encapsulation Limit option can be employed to specify how
+ many further levels of nesting the packet is permitted to undergo.
+
+4.4.3.2. Specification
+
+ This option is specified in [RFC2473].
+
+4.4.3.3. Specific Security Implications
+
+ These are discussed in [RFC2473].
+
+4.4.3.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets based on the presence of this option could result
+ in tunnel traffic being discarded.
+
+4.4.3.5. Advice
+
+ Intermediate systems should not discard packets based on the presence
+ of this option.
+
+4.4.4. Router Alert (Type=0x05)
+
+4.4.4.1. Uses
+
+ The Router Alert option [RFC2711] is employed by a number of
+ protocols, including the Resource reSerVation Protocol (RSVP)
+ [RFC2205], Multicast Listener Discovery (MLD) [RFC2710] [RFC3810],
+ Multicast Router Discovery (MRD) [RFC4286], and General Internet
+ Signaling Transport (GIST) [RFC5971]. Its usage is discussed in
+ detail in [RFC6398].
+
+4.4.4.2. Specification
+
+ This option is specified in [RFC2711].
+
+4.4.4.3. Specific Security Implications
+
+ Since this option causes the contents of the packet to be inspected
+ by the handling device, this option could be leveraged for performing
+ DoS attacks. The security implications of the Router Alert option
+ are discussed in detail in [RFC6398].
+
+4.4.4.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain this option would break any protocols
+ that rely on them, such as RSVP and multicast deployments. Please
+ see Section 4.4.4.3 for further details.
+
+4.4.4.5. Advice
+
+ Packets containing this option should be permitted in environments
+ where support for RSVP, multicast routing, or similar protocols is
+ required.
+
+4.4.5. CALIPSO (Type=0x07)
+
+4.4.5.1. Uses
+
+ This option is used for encoding explicit packet Sensitivity Labels
+ on IPv6 packets. It is intended for use only within Multi-Level
+ Secure (MLS) networking environments that are both trusted and
+ trustworthy.
+
+4.4.5.2. Specification
+
+ This option is specified in [RFC5570].
+
+4.4.5.3. Specific Security Implications
+
+ Presence of this option in a packet does not by itself create any
+ specific new threat. Packets with this option ought not normally be
+ seen on the global public Internet.
+
+4.4.5.4. Operational and Interoperability Impact If Blocked
+
+ If packets with this option are discarded or if the option is
+ stripped from the packet during transmission from source to
+ destination, then the packet itself is likely to be discarded by the
+ receiver because it is not properly labeled. In some cases, the
+ receiver might receive the packet but associate an incorrect
+ Sensitivity Label with the received data from the packet whose Common
+ Architecture Label IPv6 Security Option (CALIPSO) was stripped by a
+ middlebox (such as a packet scrubber). Associating an incorrect
+ Sensitivity Label can cause the received information to be handled
+ either as more sensitive than it really is ("upgrading") or as less
+ sensitive than it really is ("downgrading"), either of which is
+ problematic. As noted in [RFC5570], IPsec [RFC4301] [RFC4302]
+ [RFC4303] can be employed to protect the CALIPSO.
+
+4.4.5.5. Advice
+
+ Recommendations for handling the CALIPSO depend on the deployment
+ environment rather than on whether an intermediate system happens to
+ be deployed as a transit device (e.g., IPv6 transit router).
+
+ Explicit configuration is the only method via which an intermediate
+ system can know whether that particular intermediate system has been
+ deployed within an MLS environment. In many cases, ordinary
+ commercial intermediate systems (e.g., IPv6 routers and firewalls)
+ are the majority of the deployed intermediate systems inside an MLS
+ network environment.
+
+ For intermediate systems that DO NOT implement [RFC5570], there
+ should be a configuration option to either (a) drop packets
+ containing the CALIPSO or (b) ignore the presence of the CALIPSO and
+ forward the packets normally. In non-MLS environments, such
+ intermediate systems should have this configuration option set to (a)
+ above. In MLS environments, such intermediate systems should have
+ this option set to (b) above. The default setting for this
+ configuration option should be set to (a) above, because MLS
+ environments are much less common than non-MLS environments.
+
+ For intermediate systems that DO implement [RFC5570], there should be
+ configuration options (a) and (b) from the preceding paragraph and
+ also a third configuration option (c) to process packets containing a
+ CALIPSO as per [RFC5570]. When deployed in non-MLS environments,
+ such intermediate systems should have this configuration option set
+ to (a) above. When deployed in MLS environments, such intermediate
+ systems should have this configuration option set to (c). The
+ default setting for this configuration option MAY be set to (a)
+ above, because MLS environments are much less common than non-MLS
+ environments.
+
+4.4.6. SMF_DPD (Type=0x08)
+
+4.4.6.1. Uses
+
+ This option is employed in the (experimental) Simplified Multicast
+ Forwarding (SMF) for unique packet identification for IPv6
+ Identification-based DPD (I-DPD) and as a mechanism to guarantee non-
+ collision of hash values for different packets when Hash-based DPD
+ (H-DPD) is used.
+
+4.4.6.2. Specification
+
+ This option is specified in [RFC6621].
+
+4.4.6.3. Specific Security Implications
+
+ None. The use of transient numeric identifiers is subject to the
+ security and privacy considerations discussed in [NUMERIC-IDS].
+
+4.4.6.4. Operational and Interoperability Impact If Blocked
+
+ Dropping packets containing this option within a Mobile Ad Hoc
+ Network (MANET) domain would break SMF. However, dropping such
+ packets at the border of such domain would have no negative impact.
+
+4.4.6.5. Advice
+
+ Intermediate systems that are not within a MANET domain should
+ discard packets that contain this option.
+
+4.4.7. PDM (Type=0x0F)
+
+4.4.7.1. Uses
+
+ This option is employed to convey sequence numbers and timing
+ information in IPv6 packets as a basis for measurements.
+
+4.4.7.2. Specification
+
+ This option is specified in [RFC8250].
+
+4.4.7.3. Specific Security Implications
+
+ These are discussed in [RFC8250]. Additionally, since this option
+ employs transient numeric identifiers, implementations may be subject
+ to the issues discussed in [NUMERIC-IDS].
+
+4.4.7.4. Operational and Interoperability Impact If Blocked
+
+ Dropping packets containing this option will result in negative
+ interoperability implications for traffic employing this option as a
+ basis for measurements.
+
+4.4.7.5. Advice
+
+ Intermediate systems should not discard packets based on the presence
+ of this option.
+
+4.4.8. RPL Option (Type=0x23)
+
+4.4.8.1. Uses
+
+ The RPL Option provides a mechanism to include routing information in
+ each datagram that a RPL router forwards.
+
+4.4.8.2. Specification
+
+ This option is specified in [RFC9008].
+
+4.4.8.3. Specific Security Implications
+
+ These are discussed in [RFC9008].
+
+4.4.8.4. Operational and Interoperability Impact If Blocked
+
+ This option can survive outside of a RPL instance. As a result,
+ discarding packets based on the presence of this option would break
+ some use cases for RPL (see [RFC9008]).
+
+4.4.8.5. Advice
+
+ Intermediate systems should not discard IPv6 packets based on the
+ presence of this option.
+
+4.4.9. Quick-Start (Type=0x26)
+
+4.4.9.1. Uses
+
+ This IP option is used in the specification of Quick-Start for TCP
+ and IP, which is an experimental mechanism that allows transport
+ protocols, in cooperation with routers, to determine an allowed
+ sending rate at the start and, at times, in the middle of a data
+ transfer (e.g., after an idle period) [RFC4782].
+
+4.4.9.2. Specification
+
+ This option is specified in [RFC4782] on the "Experimental" track.
+
+4.4.9.3. Specific Security Implications
+
+ Section 9.6 of [RFC4782] notes that Quick-Start is vulnerable to two
+ kinds of attacks:
+
+ * attacks to increase the routers' processing and state load and
+
+ * attacks with bogus Quick-Start Requests to temporarily tie up
+ available Quick-Start bandwidth, preventing routers from approving
+ Quick-Start Requests from other connections
+
+ We note that if routers in a given environment do not implement and
+ enable the Quick-Start mechanism, only the general security
+ implications of IP options (discussed in Section 4.2) would apply.
+
+4.4.9.4. Operational and Interoperability Impact If Blocked
+
+ If packets with IPv6 Quick Start options are blocked, the host trying
+ to establish a TCP connection will fall back to not including the
+ Quick Start option -- this means that the feature will be disabled,
+ and additional delays in connection establishment will be introduced
+ (as discussed in Section 4.7.2 of [RFC4782]). We note, however, that
+ Quick-Start has been proposed as a mechanism that could be of use in
+ controlled environments and not as a mechanism that would be intended
+ or appropriate for ubiquitous deployment in the global Internet
+ [RFC4782].
+
+4.4.9.5. Advice
+
+ Intermediate systems should not discard IPv6 packets based on the
+ presence of this option.
+
+4.4.10. Deprecated (Type=0x4D)
+
+4.4.10.1. Uses
+
+ No information has been found about this option type.
+
+4.4.10.2. Specification
+
+ No information has been found about this option type.
+
+4.4.10.3. Specific Security Implications
+
+ No information has been found about this option type; hence, it has
+ been impossible to perform the corresponding security assessment.
+
+4.4.10.4. Operational and Interoperability Impact If Blocked
+
+ Unknown.
+
+4.4.10.5. Advice
+
+ Intermediate systems should discard packets that contain this option.
+
+4.4.11. RPL Option (Type=0x63)
+
+4.4.11.1. Uses
+
+ The RPL Option provides a mechanism to include routing information in
+ each datagram that a RPL router forwards.
+
+4.4.11.2. Specification
+
+ This option was originally specified in [RFC6553]. It has been
+ deprecated by [RFC9008].
+
+4.4.11.3. Specific Security Implications
+
+ These are discussed in Section 5 of [RFC6553].
+
+4.4.11.4. Operational and Interoperability Impact If Blocked
+
+ This option is meant to be employed within a RPL instance. As a
+ result, discarding packets based on the presence of this option
+ outside of a RPL instance will not result in interoperability
+ implications.
+
+4.4.11.5. Advice
+
+ Intermediate systems should discard packets that contain a RPL
+ Option.
+
+4.4.12. MPL Option (Type=0x6D)
+
+4.4.12.1. Uses
+
+ This option is used with the Multicast Protocol for Low power and
+ Lossy Networks (MPL), which provides IPv6 multicast forwarding in
+ constrained networks.
+
+4.4.12.2. Specification
+
+ This option is specified in [RFC7731] and is meant to be included
+ only in Hop-by-Hop Options headers.
+
+4.4.12.3. Specific Security Implications
+
+ These are discussed in [RFC7731].
+
+4.4.12.4. Operational and Interoperability Impact If Blocked
+
+ Dropping packets that contain an MPL Option within an MPL network
+ would break the MPL. However, dropping such packets at the border of
+ such networks will have no negative impact.
+
+4.4.12.5. Advice
+
+ Intermediate systems should not discard packets based on the presence
+ of this option. However, since this option has been specified for
+ the Hop-by-Hop Options header, such systems should consider the
+ discussion in Section 3.5.1.
+
+4.4.13. Endpoint Identification (Type=0x8A)
+
+4.4.13.1. Uses
+
+ The Endpoint Identification option was meant to be used with the
+ Nimrod routing architecture [NIMROD-DOC] but has never seen
+ widespread deployment.
+
+4.4.13.2. Specification
+
+ This option is specified in [NIMROD-DOC].
+
+4.4.13.3. Specific Security Implications
+
+ Undetermined.
+
+4.4.13.4. Operational and Interoperability Impact If Blocked
+
+ None.
+
+4.4.13.5. Advice
+
+ Intermediate systems should discard packets that contain this option.
+
+4.4.14. ILNP Nonce (Type=0x8B)
+
+4.4.14.1. Uses
+
+ This option is employed by the Identifier-Locator Network Protocol
+ for IPv6 (ILNPv6) to provide protection against off-path attacks for
+ packets when ILNPv6 is in use and as a signal during initial network-
+ layer session creation that ILNPv6 is proposed for use with this
+ network-layer session, rather than classic IPv6.
+
+4.4.14.2. Specification
+
+ This option is specified in [RFC6744].
+
+4.4.14.3. Specific Security Implications
+
+ These are discussed in [RFC6744].
+
+4.4.14.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets that contain this option will break ILNPv6
+ deployments.
+
+4.4.14.5. Advice
+
+ Intermediate systems should not discard packets based on the presence
+ of this option.
+
+4.4.15. Line-Identification Option (Type=0x8C)
+
+4.4.15.1. Uses
+
+ This option is used by an Edge Router to identify the subscriber
+ premises in scenarios where several subscriber premises may be
+ logically connected to the same interface of an Edge Router.
+
+4.4.15.2. Specification
+
+ This option is specified in [RFC6788].
+
+4.4.15.3. Specific Security Implications
+
+ These are discussed in [RFC6788].
+
+4.4.15.4. Operational and Interoperability Impact If Blocked
+
+ Since this option is meant to be used when tunneling Neighbor
+ Discovery messages in some broadband network deployment scenarios,
+ discarding packets based on the presence of this option at
+ intermediate systems will result in no interoperability implications.
+
+4.4.15.5. Advice
+
+ Intermediate systems should discard packets that contain this option.
+
+4.4.16. Jumbo Payload (Type=0XC2)
+
+4.4.16.1. Uses
+
+ The Jumbo Payload option provides the means for supporting payloads
+ larger than 65535 bytes.
+
+4.4.16.2. Specification
+
+ This option is specified in [RFC2675].
+
+4.4.16.3. Specific Security Implications
+
+ There are no specific issues arising from this option, except for
+ improper validity checks of the option and associated packet lengths.
+
+4.4.16.4. Operational and Interoperability Impact If Blocked
+
+ Discarding packets based on the presence of this option will cause
+ IPv6 jumbograms to be discarded.
+
+4.4.16.5. Advice
+
+ An operator should permit this option only in specific scenarios in
+ which support for IPv6 jumbograms is required.
+
+4.4.17. Home Address (Type=0xC9)
+
+4.4.17.1. Uses
+
+ The Home Address option is used by a Mobile IPv6 node while away from
+ home to inform the recipient of the mobile node's home address.
+
+4.4.17.2. Specification
+
+ This option is specified in [RFC6275].
+
+4.4.17.3. Specific Security Implications
+
+ There are no (known) additional security implications, other than
+ those discussed in [RFC6275].
+
+4.4.17.4. Operational and Interoperability Impact If Blocked
+
+ Discarding IPv6 packets based on the presence of this option will
+ break Mobile IPv6.
+
+4.4.17.5. Advice
+
+ Intermediate systems should not discard IPv6 packets based on the
+ presence of this option.
+
+4.4.18. IP_DFF (Type=0xEE)
+
+4.4.18.1. Uses
+
+ This option is employed with the (experimental) Depth-First
+ Forwarding (DFF) in unreliable networks.
+
+4.4.18.2. Specification
+
+ This option is specified in [RFC6971].
+
+4.4.18.3. Specific Security Implications
+
+ These are specified in [RFC6971].
+
+4.4.18.4. Operational and Interoperability Impact If Blocked
+
+ Dropping packets containing this option within a routing domain that
+ is running DFF would break DFF. However, dropping such packets at
+ the border of such domains will have no operational or
+ interoperability implications.
+
+4.4.18.5. Advice
+
+ Intermediate systems that do not operate within a routing domain that
+ is running DFF should discard packets containing this option.
+
+4.4.19. RFC3692-Style Experiment (Types = 0x1E, 0x3E, 0x5E, 0x7E, 0x9E,
+ 0xBE, 0xDE, 0xFE)
+
+4.4.19.1. Uses
+
+ These options can be employed for performing RFC3692-style
+ experiments. It is only appropriate to use these values in
+ explicitly configured experiments; they must not be shipped as
+ defaults in implementations.
+
+4.4.19.2. Specification
+
+ These options are specified in [RFC4727] in the context of
+ RFC3692-style experiments.
+
+4.4.19.3. Specific Security Implications
+
+ The specific security implications will depend on the specific use of
+ these options.
+
+4.4.19.4. Operational and Interoperability Impact If Blocked
+
+ For obvious reasons, discarding packets that contain these options
+ limits the ability to perform legitimate experiments across IPv6
+ routers.
+
+4.4.19.5. Advice
+
+ Operators should determine, according to their own circumstances,
+ whether to discard packets containing these IPv6 options.
+
+4.5. Advice on the Handling of Packets with Unknown IPv6 Options
+
+ We refer to IPv6 options that have not been assigned an IPv6 Option
+ Type in the corresponding registry, which is [IANA-IPV6-PARAM], as
+ "unknown IPv6 options".
+
+4.5.1. Uses
+
+ New IPv6 options may be specified as part of future protocol work.
+
+4.5.2. Specification
+
+ The processing of unknown IPv6 options is specified in [RFC8200].
+
+4.5.3. Specific Security Implications
+
+ For obvious reasons, it is impossible to determine specific security
+ implications of unknown IPv6 options.
+
+4.5.4. Operational and Interoperability Impact If Blocked
+
+ Discarding unknown IPv6 options may slow down the deployment of new
+ IPv6 options. As noted in [IPv6-OPTIONS], the corresponding IANA
+ registry, which is [IANA-IPV6-PARAM], should be monitored such that
+ IPv6 option filtering rules are updated as new IPv6 options are
+ standardized.
+
+4.5.5. Advice
+
+ Operators should determine, according to their own circumstances,
+ whether to discard packets containing unknown IPv6 options.
+
+5. IANA Considerations
+
+ This document has no IANA actions.
+
+6. Privacy Considerations
+
+ There are no privacy considerations associated with this document.
+
+7. Security Considerations
+
+ This document provides advice on the filtering of IPv6 packets that
+ contain IPv6 EHs (and possibly IPv6 options) at IPv6 transit routers.
+ It is meant to improve the current situation of widespread dropping
+ of such IPv6 packets in those cases where the drops result from
+ improper configuration defaults or inappropriate advice in this area.
+
+ As discussed in Section 3.3, one of the underlying principles for the
+ advice provided in this document is that IPv6 packets with specific
+ EHs or options that may represent an attack vector for infrastructure
+ devices should be dropped. While this policy helps mitigate some
+ specific attack vectors, the recommendations in this document will
+ not help to mitigate vulnerabilities based on implementation errors
+ [RFC9098].
+
+ We also note that depending on the router architecture, attempts to
+ filter packets based on the presence of IPv6 EHs or options might
+ itself represent an attack vector to network infrastructure devices
+ [RFC9098].
+
+8. References
+
+8.1. Normative References
+
+ [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
+ STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987,
+ <https://www.rfc-editor.org/info/rfc1034>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
+ Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
+ Functional Specification", RFC 2205, DOI 10.17487/RFC2205,
+ September 1997, <https://www.rfc-editor.org/info/rfc2205>.
+
+ [RFC2473] Conta, A. and S. Deering, "Generic Packet Tunneling in
+ IPv6 Specification", RFC 2473, DOI 10.17487/RFC2473,
+ December 1998, <https://www.rfc-editor.org/info/rfc2473>.
+
+ [RFC2675] Borman, D., Deering, S., and R. Hinden, "IPv6 Jumbograms",
+ RFC 2675, DOI 10.17487/RFC2675, August 1999,
+ <https://www.rfc-editor.org/info/rfc2675>.
+
+ [RFC2710] Deering, S., Fenner, W., and B. Haberman, "Multicast
+ Listener Discovery (MLD) for IPv6", RFC 2710,
+ DOI 10.17487/RFC2710, October 1999,
+ <https://www.rfc-editor.org/info/rfc2710>.
+
+ [RFC2711] Partridge, C. and A. Jackson, "IPv6 Router Alert Option",
+ RFC 2711, DOI 10.17487/RFC2711, October 1999,
+ <https://www.rfc-editor.org/info/rfc2711>.
+
+ [RFC3692] Narten, T., "Assigning Experimental and Testing Numbers
+ Considered Useful", BCP 82, RFC 3692,
+ DOI 10.17487/RFC3692, January 2004,
+ <https://www.rfc-editor.org/info/rfc3692>.
+
+ [RFC3810] Vida, R., Ed. and L. Costa, Ed., "Multicast Listener
+ Discovery Version 2 (MLDv2) for IPv6", RFC 3810,
+ DOI 10.17487/RFC3810, June 2004,
+ <https://www.rfc-editor.org/info/rfc3810>.
+
+ [RFC4286] Haberman, B. and J. Martin, "Multicast Router Discovery",
+ RFC 4286, DOI 10.17487/RFC4286, December 2005,
+ <https://www.rfc-editor.org/info/rfc4286>.
+
+ [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
+ Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
+ December 2005, <https://www.rfc-editor.org/info/rfc4301>.
+
+ [RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
+ DOI 10.17487/RFC4302, December 2005,
+ <https://www.rfc-editor.org/info/rfc4302>.
+
+ [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",
+ RFC 4303, DOI 10.17487/RFC4303, December 2005,
+ <https://www.rfc-editor.org/info/rfc4303>.
+
+ [RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4,
+ ICMPv6, UDP, and TCP Headers", RFC 4727,
+ DOI 10.17487/RFC4727, November 2006,
+ <https://www.rfc-editor.org/info/rfc4727>.
+
+ [RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick-
+ Start for TCP and IP", RFC 4782, DOI 10.17487/RFC4782,
+ January 2007, <https://www.rfc-editor.org/info/rfc4782>.
+
+ [RFC5095] Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
+ of Type 0 Routing Headers in IPv6", RFC 5095,
+ DOI 10.17487/RFC5095, December 2007,
+ <https://www.rfc-editor.org/info/rfc5095>.
+
+ [RFC5533] Nordmark, E. and M. Bagnulo, "Shim6: Level 3 Multihoming
+ Shim Protocol for IPv6", RFC 5533, DOI 10.17487/RFC5533,
+ June 2009, <https://www.rfc-editor.org/info/rfc5533>.
+
+ [RFC5570] StJohns, M., Atkinson, R., and G. Thomas, "Common
+ Architecture Label IPv6 Security Option (CALIPSO)",
+ RFC 5570, DOI 10.17487/RFC5570, July 2009,
+ <https://www.rfc-editor.org/info/rfc5570>.
+
+ [RFC5971] Schulzrinne, H. and R. Hancock, "GIST: General Internet
+ Signalling Transport", RFC 5971, DOI 10.17487/RFC5971,
+ October 2010, <https://www.rfc-editor.org/info/rfc5971>.
+
+ [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility
+ Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July
+ 2011, <https://www.rfc-editor.org/info/rfc6275>.
+
+ [RFC6398] Le Faucheur, F., Ed., "IP Router Alert Considerations and
+ Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
+ 2011, <https://www.rfc-editor.org/info/rfc6398>.
+
+ [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
+ Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
+ JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
+ Low-Power and Lossy Networks", RFC 6550,
+ DOI 10.17487/RFC6550, March 2012,
+ <https://www.rfc-editor.org/info/rfc6550>.
+
+ [RFC6553] Hui, J. and JP. Vasseur, "The Routing Protocol for Low-
+ Power and Lossy Networks (RPL) Option for Carrying RPL
+ Information in Data-Plane Datagrams", RFC 6553,
+ DOI 10.17487/RFC6553, March 2012,
+ <https://www.rfc-editor.org/info/rfc6553>.
+
+ [RFC6554] Hui, J., Vasseur, JP., Culler, D., and V. Manral, "An IPv6
+ Routing Header for Source Routes with the Routing Protocol
+ for Low-Power and Lossy Networks (RPL)", RFC 6554,
+ DOI 10.17487/RFC6554, March 2012,
+ <https://www.rfc-editor.org/info/rfc6554>.
+
+ [RFC6621] Macker, J., Ed., "Simplified Multicast Forwarding",
+ RFC 6621, DOI 10.17487/RFC6621, May 2012,
+ <https://www.rfc-editor.org/info/rfc6621>.
+
+ [RFC6740] Atkinson, RJ. and SN. Bhatti, "Identifier-Locator Network
+ Protocol (ILNP) Architectural Description", RFC 6740,
+ DOI 10.17487/RFC6740, November 2012,
+ <https://www.rfc-editor.org/info/rfc6740>.
+
+ [RFC6744] Atkinson, RJ. and SN. Bhatti, "IPv6 Nonce Destination
+ Option for the Identifier-Locator Network Protocol for
+ IPv6 (ILNPv6)", RFC 6744, DOI 10.17487/RFC6744, November
+ 2012, <https://www.rfc-editor.org/info/rfc6744>.
+
+ [RFC6788] Krishnan, S., Kavanagh, A., Varga, B., Ooghe, S., and E.
+ Nordmark, "The Line-Identification Option", RFC 6788,
+ DOI 10.17487/RFC6788, November 2012,
+ <https://www.rfc-editor.org/info/rfc6788>.
+
+ [RFC6971] Herberg, U., Ed., Cardenas, A., Iwao, T., Dow, M., and S.
+ Cespedes, "Depth-First Forwarding (DFF) in Unreliable
+ Networks", RFC 6971, DOI 10.17487/RFC6971, June 2013,
+ <https://www.rfc-editor.org/info/rfc6971>.
+
+ [RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing
+ of IPv6 Extension Headers", RFC 7045,
+ DOI 10.17487/RFC7045, December 2013,
+ <https://www.rfc-editor.org/info/rfc7045>.
+
+ [RFC7112] Gont, F., Manral, V., and R. Bonica, "Implications of
+ Oversized IPv6 Header Chains", RFC 7112,
+ DOI 10.17487/RFC7112, January 2014,
+ <https://www.rfc-editor.org/info/rfc7112>.
+
+ [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T.
+ Henderson, "Host Identity Protocol Version 2 (HIPv2)",
+ RFC 7401, DOI 10.17487/RFC7401, April 2015,
+ <https://www.rfc-editor.org/info/rfc7401>.
+
+ [RFC7731] Hui, J. and R. Kelsey, "Multicast Protocol for Low-Power
+ and Lossy Networks (MPL)", RFC 7731, DOI 10.17487/RFC7731,
+ February 2016, <https://www.rfc-editor.org/info/rfc7731>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", STD 86, RFC 8200,
+ DOI 10.17487/RFC8200, July 2017,
+ <https://www.rfc-editor.org/info/rfc8200>.
+
+ [RFC8250] Elkins, N., Hamilton, R., and M. Ackermann, "IPv6
+ Performance and Diagnostic Metrics (PDM) Destination
+ Option", RFC 8250, DOI 10.17487/RFC8250, September 2017,
+ <https://www.rfc-editor.org/info/rfc8250>.
+
+ [RFC8754] Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
+ Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
+ (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
+ <https://www.rfc-editor.org/info/rfc8754>.
+
+ [RFC8900] Bonica, R., Baker, F., Huston, G., Hinden, R., Troan, O.,
+ and F. Gont, "IP Fragmentation Considered Fragile",
+ BCP 230, RFC 8900, DOI 10.17487/RFC8900, September 2020,
+ <https://www.rfc-editor.org/info/rfc8900>.
+
+ [RFC9008] Robles, M.I., Richardson, M., and P. Thubert, "Using RPI
+ Option Type, Routing Header for Source Routes, and IPv6-
+ in-IPv6 Encapsulation in the RPL Data Plane", RFC 9008,
+ DOI 10.17487/RFC9008, April 2021,
+ <https://www.rfc-editor.org/info/rfc9008>.
+
+8.2. Informative References
+
+ [Biondi-2007]
+ Biondi, P. and A. Ebalard, "IPv6 Routing Header Security",
+ CanSecWest Security Conference, April 2007,
+ <http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf>.
+
+ [Cisco-EH] Cisco Systems, "IPv6 Extension Headers Review and
+ Considerations", Whitepaper, October 2006,
+ <https://www.cisco.com/en/US/technologies/tk648/tk872/
+ technologies_white_paper0900aecd8054d37d.pdf>.
+
+ [FW-Benchmark]
+ Zack, E., "Firewall Security Assessment and Benchmarking
+ IPv6 Firewall Load Tests", IPv6 Hackers Meeting #1,
+ Berlin, Germany, June 2013,
+ <https://www.ipv6hackers.org/files/meetings/ipv6-hackers-
+ 1/zack-ipv6hackers1-firewall-security-assessment-and-
+ benchmarking.pdf>.
+
+ [Huston-2022]
+ Huston, G. and J. Damas, "IPv6 Fragmentation and EH
+ Behaviours", IEPG Meeting at IETF 113", March 2022,
+ <https://iepg.org/2022-03-20-ietf113/huston-v6frag.pdf>.
+
+ [IANA-IPV6-PARAM]
+ IANA, "Internet Protocol Version 6 (IPv6) Parameters",
+ <https://www.iana.org/assignments/ipv6-parameters>.
+
+ [IANA-PROTOCOLS]
+ IANA, "Protocol Numbers",
+ <https://www.iana.org/assignments/protocol-numbers>.
+
+ [IPv6-OPTIONS]
+ Gont, F., Liu, W., and R. P. Bonica, "Transmission and
+ Processing of IPv6 Options", Work in Progress, Internet-
+ Draft, draft-gont-6man-ipv6-opt-transmit-02, 21 August
+ 2015, <https://datatracker.ietf.org/doc/html/draft-gont-
+ 6man-ipv6-opt-transmit-02>.
+
+ [JAMES] Iurman, J., "Just Another Measurement of Extension header
+ Survivability (JAMES)", Work in Progress, Internet-Draft,
+ draft-vyncke-v6ops-james-02, 11 July 2022,
+ <https://datatracker.ietf.org/doc/html/draft-vyncke-v6ops-
+ james-02>.
+
+ [NIMROD-DOC]
+ "Nimrod Documentation",
+ <http://ana-3.lcs.mit.edu/~jnc/nimrod>.
+
+ [NIMROD-EID]
+ Lynn, C., "Endpoint Identifier Destination Option", Work
+ in Progress, Internet-Draft, draft-ietf-nimrod-eid-00, 2
+ March 1996, <https://datatracker.ietf.org/doc/html/draft-
+ ietf-nimrod-eid-00>.
+
+ [NUMERIC-IDS]
+ Gont, F. and I. Arce, "On the Generation of Transient
+ Numeric Identifiers", Work in Progress, Internet-Draft,
+ draft-irtf-pearg-numeric-ids-generation-11, 11 July 2022,
+ <https://datatracker.ietf.org/doc/html/draft-irtf-pearg-
+ numeric-ids-generation-11>.
+
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
+ December 1998, <https://www.rfc-editor.org/info/rfc2460>.
+
+ [RFC3871] Jones, G., Ed., "Operational Security Requirements for
+ Large Internet Service Provider (ISP) IP Network
+ Infrastructure", RFC 3871, DOI 10.17487/RFC3871, September
+ 2004, <https://www.rfc-editor.org/info/rfc3871>.
+
+ [RFC6192] Dugal, D., Pignataro, C., and R. Dunn, "Protecting the
+ Router Control Plane", RFC 6192, DOI 10.17487/RFC6192,
+ March 2011, <https://www.rfc-editor.org/info/rfc6192>.
+
+ [RFC7126] Gont, F., Atkinson, R., and C. Pignataro, "Recommendations
+ on Filtering of IPv4 Packets Containing IPv4 Options",
+ BCP 186, RFC 7126, DOI 10.17487/RFC7126, February 2014,
+ <https://www.rfc-editor.org/info/rfc7126>.
+
+ [RFC7739] Gont, F., "Security Implications of Predictable Fragment
+ Identification Values", RFC 7739, DOI 10.17487/RFC7739,
+ February 2016, <https://www.rfc-editor.org/info/rfc7739>.
+
+ [RFC7872] Gont, F., Linkova, J., Chown, T., and W. Liu,
+ "Observations on the Dropping of Packets with IPv6
+ Extension Headers in the Real World", RFC 7872,
+ DOI 10.17487/RFC7872, June 2016,
+ <https://www.rfc-editor.org/info/rfc7872>.
+
+ [RFC9098] Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston,
+ G., and W. Liu, "Operational Implications of IPv6 Packets
+ with Extension Headers", RFC 9098, DOI 10.17487/RFC9098,
+ September 2021, <https://www.rfc-editor.org/info/rfc9098>.
+
+Acknowledgements
+
+ The authors would like to thank Ron Bonica for his work on earlier
+ draft versions of this document.
+
+ The authors of this document would like to thank (in alphabetical
+ order) Mikael Abrahamsson, Brian Carpenter, Tim Chown, Roman Danyliw,
+ Darren Dukes, Lars Eggert, David Farmer, Mike Heard, Bob Hinden,
+ Christian Huitema, Benjamin Kaduk, Erik Kline, Murray Kucherawy, Jen
+ Linkova, Carlos Pignataro, Alvaro Retana, Maria Ines Robles,
+ Zaheduzzaman Sarker, Donald Smith, Pascal Thubert, Ole Troan, Gunter
+ Van de Velde, Éric Vyncke, and Robert Wilton for providing valuable
+ comments on earlier draft versions of this document.
+
+ This document borrows some text and analysis from [RFC7126], which is
+ authored by Fernando Gont, Randall Atkinson, and Carlos Pignataro.
+
+ The authors would like to thank Warren Kumari and Éric Vyncke for
+ their guidance during the publication process for this document.
+
+ Fernando would also like to thank Brian Carpenter and Ran Atkinson
+ who, over the years, have answered many questions and provided
+ valuable comments that have benefited his protocol-related work
+ (including the present document).
+
+Authors' Addresses
+
+ Fernando Gont
+ SI6 Networks
+ Segurola y Habana 4310 7mo piso
+ Ciudad Autonoma de Buenos Aires
+ Argentina
+ Email: fgont@si6networks.com
+ URI: https://www.si6networks.com
+
+
+ Will (Shucheng) Liu
+ Huawei Technologies
+ Bantian, Longgang District
+ Shenzhen
+ 518129
+ China
+ Email: liushucheng@huawei.com