diff options
Diffstat (limited to 'doc/rfc/rfc1627.txt')
-rw-r--r-- | doc/rfc/rfc1627.txt | 451 |
1 files changed, 451 insertions, 0 deletions
diff --git a/doc/rfc/rfc1627.txt b/doc/rfc/rfc1627.txt new file mode 100644 index 0000000..cbfc9fa --- /dev/null +++ b/doc/rfc/rfc1627.txt @@ -0,0 +1,451 @@ + + + + + + +Network Working Group E. Lear +Request for Comments: 1627 Silicon Graphics, Inc. +Category: Informational E. Fair + Apple Computer, Inc. + D. Crocker + Silicon Graphics, Inc. + T. Kessler + Sun Microsystems, Inc. + July 1994 + + + Network 10 Considered Harmful + (Some Practices Shouldn't be Codified) + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + +SUMMARY + + Re-use of Internet addresses for private IP networks is the topic of + the recent RFC 1597 [1]. It reserves a set of IP network numbers, + for (re-)use by any number of organizations, so long as those + networks are not routed outside any single, private IP network. RFC + 1597 departs from the basic architectural rule that IP addresses must + be globally unique, and it does so without having had the benefit of + the usual, public review and approval by the IETF or IAB. This + document restates the arguments for maintaining a unique address + space. Concerns for Internet architecture and operations, as well as + IETF procedure, are explored. + +INTRODUCTION + + Growth in use of Internet technology and in attachments to the + Internet have taken us to the point that we now are in danger of + running out of unassigned IP network numbers. Initially, numbers + were formally assigned only when a network was about to be attached + to the Internet. This caused difficulties when initial use of IP + substantially preceded the decision and permission to attach to the + Internet. In particular, re-numbering was painful. The lesson that + we learned was that every IP address ought to be globally unique, + independent of its attachment to the Internet. This makes it + possible for any two network entities to communicate, no matter where + either might be located. This model is the result of a decades-long + evolution, through which the community realized how painful it can be + to convert a network of computers to use an assigned number after + + + +Lear, Fair, Crocker & Kessler [Page 1] + +RFC 1627 Network 10 Considered Harmful July 1994 + + + using random or default addresses found on computers just out of the + box. RFC 1597 abrogates this model without benefit of general IETF + community discussion and consensus, leaving policy and operational + questions unasked and unanswered. + +KEEP OUR EYES ON THE PRIZE: AN ARCHITECTURAL GOAL AND VIOLATION + + A common -- if not universal -- ideal for the future of IP is for + every system to be globally accessible, given the proper security + mechanisms. Whether such systems comprise toasters, light switches, + utility power poles, field medical equipment, or the classic examples + of "computers", our current model of assignment is to ensure that + they can interoperate. + + In order for such a model to work there must exist a globally unique + addressing system. A common complaint throughout the community is + that the existing security in host software does not allow for every + (or even many) hosts in a corporate environment to have direct IP + access. When this problem is addressed through proper privacy and + authentication standards, non-unique IP addresses will become a + bottleneck to easy deployment if the recommendations in RFC 1597 are + followed. + + The IP version 4 (IPv4) address space will be exhausted. The + question is simply: when? + + If we assert that all IP addresses must be unique globally, connected + or not, then we will run out of IP address space soon. + + If we assert that only IP addresses used on the world-wide Internet + need to be globally unique, then we will run out of IP address space + later. + + It is absolutely key to keep the Internet community's attention + focused on the efforts toward IP next generation (IPng), so that we + may transcend the limitations of IPv4. RFC 1597 produces apparent + relief from IPv4 address space exhaustion by masking those networks + that are not connecting to the Internet, today. However, this + apparent relief will likely produce two results: complacency on the + large part of the community that does not take the long term view, + and a very sudden IP address space exhaustion at some later date. + + Prior to IPng deployment, it is important to preserve all the + semantics that make both the Internet and Internet technology so very + valuable for interoperability. Apple Computer, IBM, and Motorola + could not collaborate as easily as they have to produce the PowerPC + without uniquely assigned IP addresses. The same can be said of the + Silicon Graphics merger with MIPS. There are many, many more examples + + + +Lear, Fair, Crocker & Kessler [Page 2] + +RFC 1627 Network 10 Considered Harmful July 1994 + + + that can be cited. + + It should be noted that a scheme similar to RFC 1597 can be + implemented at the time that we actually run out of assignable IPv4 + address space; it simply requires that those organizations which have + been assigned addresses but are not yet connected to the Internet + return their addresses to IANA. It is important that the IAB (and + IANA as its agent) reassert their ownership of the IP address space + now, to preclude challenges to this type of reassignment. + +OPERATIONAL ISSUES + +RFC 1597 Implementations + + Methods are needed to ensure that the remaining addresses are + allocated and used frugally. Due to the current problems, Internet + service providers have made it increasingly difficult for + organizations to acquire public IP network numbers. Private networks + have always had the option of using addresses not assigned to them by + appropriate authorities. We do not know how many such networks + exist, because by their nature they do not interact with the global + Internet. By using a random address, a company must take some care + to ensure it is able to route to the properly registered owner of + that network. + + RFC 1597 proposes to solve the routing problem by assigning numbers + that will never be used outside of private environments. Using such + standard numbers introduces a potential for clashes in another way. + If two private networks follow RFC 1597 and then later wish to + communicate with each other, one will have to renumber. The same + problem occurs if a private network wishes to become public. The + likely cost of renumbering is linear to the number of hosts on a + network. Thus, a large company with 10,000 hosts on a network could + incur considerable expense if it either merged with another company + or joined the Internet in such a way as to allow all hosts to + directly access the outside network. + + The probability of address clashes occurring over time approach 100% + with RFC 1597. Picking a random network number reduces the chances + of having to renumber hosts, but introduces the routing problems + described above. Best of all, retrieving assigned numbers from the + appropriate authority in the first place eliminates both existing and + potential address conflicts at the cost of using a part of the + address space. + + Apple Computer once believed that none of its internal systems would + ever speak IP directly to the outside world, and as such, network + operations picked IP class A network 90 out of thin air to use. + + + +Lear, Fair, Crocker & Kessler [Page 3] + +RFC 1627 Network 10 Considered Harmful July 1994 + + + Apple is only now recovering from this error, having renumbered some + 5,000 hosts to provide them with "desktop" Internet access. Unless + the Internet community reaffirms its commitment to a globally unique + address space, we condemn many thousands of organizations to similar + pain when they too attempt to answer the call of the global Internet. + + Another timely example of problems caused by RFC 1597 is Sun's use of + Internet multicasting. Sun selectively relays specific multicast + conferences. This has the effect of making many hosts at Sun visible + to the Internet, even though they are not addressable via IP unicast + routing. If they had non-global addresses this would not work at + all. It is not possible to predict which machines need global + addresses in advance. Silicon Graphics has a similar configuration, + as is likely for others, as well. + + Some might argue that assigning numbers to use for private networks + will prevent accidental leaks from occurring through some sort of + convention a'la Martian packets. While the proposal attempts to + create a standard for "private" address use, there is absolutely no + way to ensure that other addresses are not also used. + + Hence, the "standard" becomes nothing but a misleading heuristic. In + fact, it is essential that routers to the global Internet advertise + networks based only on explicit permission, rather than refusing to + advertise others based on implicit prohibition, as supported by the + policy formally created in RFC 1597. + +Security Issues + + Administrators will have a hard time spotting unauthorized networks, + when their network has been breached (either intentionally or + unintentionally) because the other networks might have the same + numbers as those normally in the routing tables. More over, an + inadvertent connection could possibly have a double whammy effect of + partitioning two operational networks. + + It is worth emphasizing that IP providers should filter out all but + authorized networks. Such a practice would not only prevent + accidents but also enhance the security of the Internet by reducing + the potential number of points of attack. + + Internet multicasting adds a new dimension to security. In some + cases it may possible to allow multicasting through firewalls that + completely restrict unicast routing. Otherwise unconnected networks + might well need unique addresses, as illustrated in the example + above. + + + + + +Lear, Fair, Crocker & Kessler [Page 4] + +RFC 1627 Network 10 Considered Harmful July 1994 + + +Problems with Examples + + RFC 1597 gives several examples of IP networks that need not have + globally unique address spaces. Each of those cases is plausible, + but that does not make it legitimate to ENCOURAGE non-uniqueness of + the addresses. In fact, it is equally plausible that globally unique + IP addresses will be required, for every one of the scenarios + described in RFC 1597: + + - Airport displays are public information and multicasting beyond the + airport might be useful. + + - An organization's machines which, today, do not need global + connectivity might need it tomorrow. Further, merging + organizations creates havoc when the addresses collide. + + - Current use of firewalls is an artifact of limitations in the + technology. Let's fix the problem, not the symptom. + + - Inter-organization private links do not generate benefit from being + any more correct in guessing which machines want to interact than + is true for general Internet access. + + This is another point that warrants repetition: the belief that + administrators can predict which machines will need Internet access + is quite simply wrong. We need to reduce or eliminate the penalties + associated with that error, in order to encourage as much Internet + connectivity as operational policies and technical security permit. + RFC 1597 works very much against this goal. + +Problems With "Advantages" And More Disadvantages + + RFC 1597 claims that Classless Inter-Domain Routing (CIDR) will + require enterprises to renumber their networks. In the general case, + this will only involve those networks that are routed outside of + enterprises. Since RFC 1597 addresses private enterprise networks, + this argument does not apply. + + The authors mention that DCHP-based tools [2] might help network + number transition. However, it is observed that by and large such + tools are currently only "potential" in nature. + + Additionally, with the onslaught of ISDN, slip, and PPP in host + implementations, the potential for a workstation to become a router + inadvertently has never been greater. Use of a common set of + addresses for private networks virtually assures administrators of + having their networks partitioned, if they do not take care to + carefully control modem connections. + + + +Lear, Fair, Crocker & Kessler [Page 5] + +RFC 1627 Network 10 Considered Harmful July 1994 + + + Finally, RFC 1597 implies that it may be simple to change a host's IP + address. For a variety of reasons this may not be the case, and it + is not the norm today. For example, a host may be well known within + a network. It may have long standing services such as NFS, which + would cause problems for clients were its address changed. A host + may have software licenses locked by IP address. Thus, migrating a + host from private to global addressing may prove difficult. At the + very least, one should be careful about addressing well known hosts. + +POLICY ISSUES + +IANA Has Overstepped Their Mandate + + For many years, IANA has followed an assignment policy based on the + expectation of Internet connectivity for ALL assignees. As such it + serves to encourage interconnectivity. IANA assignment of the + network numbers listed in RFC 1597 serves to formally authorize + behavior contrary to this accepted practice. Further, this change + was effected without benefit of community review and approval. + + RFC 1597 specifies a new operational requirement explicitly: network + service providers must filter the IANA assigned network numbers + listed in RFC 1597 from their routing tables. This address space + allocation is permanently removed from being used on the Internet. + + As we read RFC 1601 [3], this action is not within the purview of + IANA, which should only be assigning numbers within the current + standards and axioms that underlie the Internet. IP network numbers + are assigned uniquely under the assumption that they will be used on + the Internet at some future date. Such assignments violate that + axiom, and constitute an architectural change to the Internet. RFC + 1602 [4] and RFC 1310 [5] also contain identical wording to this + effect in the section that describes IANA. + + While RFC 1597 contains a view worthy of public debate, it is not + ready for formal authorization. Hence, we strongly encourage IANA to + withdraw its IP address assignments documented by RFC 1597 forthwith. + + The IAB should review the address assignment policies and procedures + that compose IANA's mandate, and reaffirm the commitment to a + globally unique IP address space. + +COMMENTS AND CONCLUSIONS + + The Internet technology and service is predicated on a global address + space. Members of the Internet community have already experienced + and understood the problems and pains associated with uncoordinated + private network number assignments. In effect the proposal attempts + + + +Lear, Fair, Crocker & Kessler [Page 6] + +RFC 1627 Network 10 Considered Harmful July 1994 + + + to codify uncoordinated behavior and alter the accepted Internet + addressing model. Hence, it needs to be considered much more + thoroughly. + + RFC 1597 gives the illusion of remedying a problem, by creating + formal structure to a long-standing informal practice. In fact, the + structure distracts us from the need to solve these very real + problems and does not even provide substantive aid in the near-term. + + In the past we have all dreaded the idea of having any part of the + address space re-used. Numerous luminaries have both written and + spoke at length, explaining why it is we want direct connections from + one host to another. Before straying from the current architectural + path, we as a community should revisit the reasoning behind the + preaching of unique addressing. While RFC 1597 attempts to change + this model, its costs and limitations for enterprises can be + enormous, both in the short and long term. + +REFERENCES + + [1] Rekhter, Y., Moskowitz, B., Karrenberg, D., and G. de Groot, + "Address Allocation for Private Internets", T.J. Watson Research + Center, IBM Corp., Chrysler Corp., RIPE NCC, RFC 1597, March + 1994. + + [2] Droms, R., "Dynamic Host Configuration Protocol", RFC 1541, + Bucknell University, October 1993. + + [3] Huitema, C., "Charter of the Internet Architecture Board (IAB)", + RFC 1601, IAB, March 1994. + + [4] Internet Architecture Board, Internet Engineering Steering + Group, "The Internet Standards Process -- Revision 2", IAB, + IESG, RFC 1602, March 1994. + + [5] Internet Activities Board, "The Internet Standards Process", RFC + 1310, IAB, March 1992. + + [6] Internet Activities Board, "Summary of Internet Architecture + Discussion", Notes available from ISI, [ftp.isi.edu: + pub/IAB/IABmins.jan91Arch.txt], IAB, January 1991. + +SECURITY CONSIDERATIONS + + See the section, "Security Issues". + + + + + + +Lear, Fair, Crocker & Kessler [Page 7] + +RFC 1627 Network 10 Considered Harmful July 1994 + + +AUTHORS' ADDRESSES + + Eliot Lear + Silicon Graphics, Inc. + 2011 N. Shoreline Blvd. + Mountain View, CA + 94043-1389 + + Phone: +1 415 390 2414 + EMail: lear@sgi.com + + + Erik Fair + Apple Computer, Inc. + 1 Infinite Loop + Cupertino, CA 95014 + + Phone: +1 408 974 1779 + EMail: fair@apple.com + + + Dave Crocker + Silicon Graphics, Inc. + 2011 N. Shoreline Blvd. + Mountain View, CA + 94043-1389 + + Phone: +1 415 390 1804 + EMail: dcrocker@sgi.com + + + Thomas Kessler + Sun Microsystems Inc. + Mail Stop MTV05-44 + 2550 Garcia Ave. + Mountain View, CA 94043 + + Phone: +1 415 336 3145 + EMail: kessler@eng.sun.com + + + + + + + + + + + + +Lear, Fair, Crocker & Kessler [Page 8] + |