diff options
Diffstat (limited to 'doc/rfc/rfc2644.txt')
-rw-r--r-- | doc/rfc/rfc2644.txt | 227 |
1 files changed, 227 insertions, 0 deletions
diff --git a/doc/rfc/rfc2644.txt b/doc/rfc/rfc2644.txt new file mode 100644 index 0000000..17668a3 --- /dev/null +++ b/doc/rfc/rfc2644.txt @@ -0,0 +1,227 @@ + + + + + + +Network Working Group D. Senie +Request for Comments: 2644 Amaranth Networks Inc. +Updates: 1812 August 1999 +BCP: 34 +Category: Best Current Practice + + + Changing the Default for Directed Broadcasts in Routers + +Status of this Memo + + This document specifies an Internet Best Current Practices for the + Internet Community, and requests discussion and suggestions for + improvements. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (1999). All Rights Reserved. + +1. Introduction + + Router Requirements [1] specifies that routers must receive and + forward directed broadcasts. It also specifies that routers MUST have + an option to disable this feature, and that this option MUST default + to permit the receiving and forwarding of directed broadcasts. While + directed broadcasts have uses, their use on the Internet backbone + appears to be comprised entirely of malicious attacks on other + networks. + + Changing the required default for routers would help ensure new + routers connected to the Internet do not add to the problems already + present. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119. + +2. Discussion + + Damaging denial of service attacks led to the writing of [2] on + Ingress Filtering. Many network providers and corporate networks have + endorsed the use of these methods to ensure their networks are not + the source of such attacks. + + A recent trend in Smurf Attacks [3] is to target networks which + permit directed broadcasts from outside their networks. By permitting + directed broadcasts, these systems become "Smurf Amplifiers." + + + + +Senie Best Current Practice [Page 1] + +RFC 2644 Default Change for Directed Broadcast August 1999 + + + While the continued implementation of ingress filters remains the + best way to limit these attacks, restricting directed broadcasts + should also receive priority. + + Network service providers and corporate network operators are urged + to ensure their networks are not susceptible to directed broadcast + packets originating outside their networks. + + Mobile IP [4] had provisions for using directed broadcasts in a + mobile node's use of dynamic agent discovery. While some + implementations support this feature, it is unclear whether it is + useful. Other methods of achieving the same result are documented in + [5]. It may be worthwhile to consider removing the language on using + directed broadcasts as Mobile IP progresses on the standards track. + +3. Recommendation + + Router Requirements [1] is updated as follows: + + Section 4.2.2.11 (d) is replaced with: + + (d) { <Network-prefix>, -1 } + + Directed Broadcast - a broadcast directed to the specified network + prefix. It MUST NOT be used as a source address. A router MAY + originate Network Directed Broadcast packets. A router MAY have a + configuration option to allow it to receive directed broadcast + packets, however this option MUST be disabled by default, and thus + the router MUST NOT receive Network Directed Broadcast packets + unless specifically configured by the end user. + + Section 5.3.5.2, second paragraph replaced with: + + A router MAY have an option to enable receiving network-prefix- + directed broadcasts on an interface and MAY have an option to + enable forwarding network-prefix-directed broadcasts. These + options MUST default to blocking receipt and blocking forwarding + of network-prefix-directed broadcasts. + +4. Security Considerations + + The goal of this document is to reduce the efficacy of certain types + of denial of service attacks. + +5. References + + [1] Baker, F., "Requirements for IP Version 4 Routers", RFC 1812, + June 1995. + + + +Senie Best Current Practice [Page 2] + +RFC 2644 Default Change for Directed Broadcast August 1999 + + + [2] Ferguson, P. and D. Senie, "Ingress Filtering", RFC 2267, January + 1998. + + [3] See the pages by Craig Huegen at: + http://www.quadrunner.com/~chuegen/smurf.txt, and the CERT + advisory at: http://www.cert.org/advisories/CA-98.01.smurf.html + + [4] Perkins, C., "IP Mobility Support", RFC 2002, October 1996. + + [5] P. Calhoun, C. Perkins, "Mobile IP Dynamic Home Address + Allocation Extensions", Work in Progress. + +6. Acknowledgments + + The author would like to thank Brandon Ross of Mindspring and Gabriel + Montenegro of Sun for their input. + +7. Author's Address + + Daniel Senie + Amaranth Networks Inc. + 324 Still River Road + Bolton, MA 01740 + + Phone: (978) 779-6813 + EMail: dts@senie.com + + + + + + + + + + + + + + + + + + + + + + + + + +Senie Best Current Practice [Page 3] + +RFC 2644 Default Change for Directed Broadcast August 1999 + + +8. Full Copyright Statement + + Copyright (C) The Internet Society (1999). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Senie Best Current Practice [Page 4] + |