<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-02"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="March" day="28"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Sometimes these measurements are viewed as unwelcome or aggressive. This document proposes some simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or to stop the probing.</li>
      </ul>
      <t>Note: it is expected that only researchers with no bad intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a probe description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a probe description file (see <xref target="file"/>) as defined in <xref target="iana"/>: "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the probe description file must be made available at "https://example.net/.well-known/probing.txt". The probe description file must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probe/Measurement description
    Description: This is a description of the measurement. The in-band probe attribution was used by [I-D.draft-vyncke-v6ops-james].
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>An alternative to URI inclusion is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the probe description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the probe description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the probe description file (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the measurement allows for it, a probe description URI should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part. Note that if the probe is destined to a listened-to/well-known UDP port, the inclusion of the probe description URI may produce undefined results;</li>
        <li>for a <xref target="RFC9293"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC9293"/> (2nd paragraph). However, it may change the way the packet is processed, i.e., SYN packets containing data might be discarded;</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in a PadN option. Indeed, the probe attribution URI can only be added to IPv6 packets in some extension headers used for the probing. However, inserting the probe description URI in PadN options could bias the measurement itself: as per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</li>
        <li>etc.</li>
      </ul>
      <t>The probe description URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the probe description URI cannot be placed at the beginning of the payload, then it should be preceded by an octet of 0x00. Inserting the probe description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU.</t>
      <t>Note: the above techniques produce a valid and legitimate packet for all the nodes forwarding the probe, except maybe for a hop-by-hop options header with a PadN option containing the probe description URI. As for the receiver, it may or may not process the packet, depending on where the probe description URI is included (e.g., TCP SYN flag with the probe description URI included in data, destination options header with a PadN option containing the probe description URI). As a consequence, a response may not be received. The choice of the probe description URI location is important and highly depends on the context, which is why multiple possibilities are proposed in this document.</t>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on will or context. The authors recommend the following classification of priorities:</t>
      <ol spacing="normal" type="1">
        <li>Both out-of-band and in-band</li>
        <li>Out-of-band only</li>
        <li>In-band only</li>
        <li>None</li>
      </ol>
      <t>Both out-of-band and in-band combined should be preferred. It could be used as an indirect means of "authenticating" the probe description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). However, the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe researcher), dynamic source addresses, etc. In that case, the in-band solution should be preferred.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>While it is expected that only researchers with no bad intentions will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party.  As a consequence, the recipient of this information cannot trust this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9293"/>
            <seriesInfo name="RFC" value="9293"/>
            <seriesInfo name="STD" value="7"/>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, and Warren Kumari.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
