<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.6.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-00"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2022" month="September" day="02"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. This is similar scan and could be perceived as aggressive. This document proposes a couple of simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to avoid wasting other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests a couple of simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or stop the probing.</li>
      </ul>
      <t>Note: it is expected that only good-willing researchers will use these techniques.</t>
    </section>
    <section anchor="probe-measurement-description">
      <name>Probe / Measurement Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a "probe description URI" (see <xref target="text"/>) as a URI pointing to:</t>
        <ul spacing="normal">
          <li>a "Probe Description", see <xref target="text"/>, e.g., "https://example.net/measurement.txt";</li>
          <li>an email address, e.g., "mailto:eric@example.net";</li>
          <li>a phone number to call, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="text">
        <name>Probe Description Text</name>
        <t>Similarly, as in <xref target="RFC9116"/>, when a node probes other nodes over the Internet, it should create a text file following the syntax described in section 3 of <xref target="RFC9116"/> and should have the following fields:</t>
        <ul spacing="normal">
          <li>contact;</li>
          <li>expires;</li>
          <li>preferred-languages.</li>
        </ul>
        <t>Plus, another one "description" which is a URI pointing a document describing the measurement.</t>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>When it is not possible to include the "probe description URI" in the probe packet itself, then a specific URI must be constructed based on the source address of the probe packet following <xref target="RFC8615"/>, e.g., for a probe source address of 2001:db8::dead, the following URI are constructed:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the URI is "https://example.net/.well-known/probing.txt" ;</li>
        <li>else (or in addition), the URI is "https://[2001:db8::dead]/.well-known/probing.txt". Of course, there will be a certificate verification issue.</li>
      </ul>
      <t>The constructed URI must be a reference to the "Probe description Text" (see <xref target="text"/>).</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the desired measurement allows for it, one "probe description URI" should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part;</li>
        <li>for a <xref target="RFC793"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC793"/> (2nd paragraph);</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in the PadN option. Note that, per the informational <xref target="RFC4942"/> section 2.1.9.5, it is suggested that PadN option should only contain 0x0 and be smaller than 8 octets, so the proposed insertion of the URI in PadN option could have influence on the measurement itself;</li>
        <li>etc.</li>
      </ul>
      <t>The URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the URI cannot be placed at the beginning of the payload, then it should be preceded also by an octet of 0x00.</t>
      <t>Note: using the above technique produces a valid and legit packet for all the nodes forwarding the probe. The node receiving the probe may or may not process the received packet, but this should cause no harm if the probing rate is very low as compared to the network bandwidth and to the processing capacity of all the nodes. As the insertion of the URI in the packet may not respect the syntax of the protocol, responses may not be received (such a TCP SYN+ACK) and perhaps an ICMP should be expected or more probably an absence of reply.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>While it is expected that only good-willing researchers will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action was attributed to a third party.  The recipient of this information cannot, as a result, rely on this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, they should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following:</t>
      <ul spacing="normal">
        <li>additional values (using the template from <xref target="RFC8615"/>):</li>
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J.P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp’ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
