<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.6.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vyncke-opsec-probe-attribution-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-vyncke-opsec-probe-attribution-01"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2022" month="March" day="03"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. This is similar scan and could be perceived as aggressive. This document proposes a couple of simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-vyncke-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vyncke-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to avoid wasting other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests a couple of simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or stop the probing.</li>
      </ul>
      <t>Note: it is expected that only good-willing researchers will use these techniques.</t>
    </section>
    <section anchor="probe-measurement-description">
      <name>Probe / Measurement Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a "probe description URI" (see <xref target="text"/>) as a URI pointing to:</t>
        <ul spacing="normal">
          <li>a "Probe Description", see <xref target="text"/>, e.g., "https://example.net/measurement.txt";</li>
          <li>an email address, e.g., "mailto:eric@example.net";</li>
          <li>a phone number to call, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="text">
        <name>Probe Description Text</name>
        <t>Similarly, as in <xref target="I-D.draft-foudil-securitytxt"/>, when a node probes other nodes over the Internet, it should create a text file following the syntax described in section 3 of <xref target="I-D.draft-foudil-securitytxt"/> and should have the following fields:</t>
        <ul spacing="normal">
          <li>contact;</li>
          <li>expires;</li>
          <li>preferred-languages.</li>
        </ul>
        <t>Plus, another one "description" which is a URI pointing a document describing the measurement.</t>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>When it is not possible to include the "probe description URI" in the probe packet itself, then a specific URI must be constructed based on the source address of the probe packet following <xref target="RFC8615"/>, e.g., for a probe source address of 2001:db8::dead, the following URI are constructed:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the URI is "https://example.net/.well-known/probing.txt" ;</li>
        <li>else (or in addition), the URI is "https://[2001:db8::dead]/.well-known/probing.txt". Of course, there will be a certificate verification issue.</li>
      </ul>
      <t>The constructed URI must be a reference to the "Probe description Text" (see <xref target="text"/>).</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the desired measurement allows for it, one "probe description URI" should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part;</li>
        <li>for a <xref target="RFC793"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC793"/> (2nd paragraph);</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in the PadN option. Note that, per the informational <xref target="RFC4942"/> section 2.1.9.5, it is suggested that PadN option should only contain 0x0 and be smaller than 8 octets, so the proposed insertion of the URI in PadN option could have influence on the measurement itself;</li>
        <li>etc.</li>
      </ul>
      <t>The URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the URI cannot be placed at the beginning of the payload, then it should be preceded also by an octet of 0x00.</t>
      <t>Note: using the above technique produces a valid and legit packet for all the nodes forwarding the probe. The node receiving the probe may or may not process the received packet, but this should cause no harm if the probing rate is very low as compared to the network bandwidth and to the processing capacity of all the nodes. As the insertion of the URI in the packet may not respect the syntax of the protocol, responses may not be received (such a TCP SYN+ACK) and perhaps an ICMP should be expected or more probably an absence of reply.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>While it is expected that only good-willing researchers will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action was attributed to a third party.  The recipient of this information cannot, as a result, rely on this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, they should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following:</t>
      <ul spacing="normal">
        <li>additional values (using the template from <xref target="RFC8615"/>):</li>
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.draft-foudil-securitytxt">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="Edwin Foudil">
	 </author>
            <author fullname="Yakov Shafranovich">
              <organization>Nightwatch Cybersecurity</organization>
            </author>
            <date day="24" month="May" year="2021"/>
            <abstract>
              <t>   When security vulnerabilities are discovered by researchers, proper
   reporting channels are often lacking.  As a result, vulnerabilities
   may be left unreported.  This document defines a machine-parsable
   format ("security.txt") to help organizations describe their
   vulnerability disclosure practices to make it easier for researchers
   to report vulnerabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-foudil-securitytxt-12"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J.P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp’ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
