<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-03"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="April" day="03"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Sometimes these measurements are viewed as unwelcome or aggressive. This document proposes some simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or to stop the probing.</li>
      </ul>
      <t>Note: it is expected that only researchers with no bad intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a probe description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a probe description file (see <xref target="file"/>) as defined in <xref target="iana"/>: "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the probe description file must be made available at "https://example.net/.well-known/probing.txt". The probe description file must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probe/Measurement description
    Description: This is a description of the measurement. The in-band probe attribution was used by [I-D.draft-vyncke-v6ops-james].
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>An alternative to URI inclusion is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the probe description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the probe description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the probe description file (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the measurement allows for it, a probe description URI should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part. Note that if the probe is destined to a listened-to/well-known UDP port, the inclusion of the probe description URI may produce undefined results;</li>
        <li>for a <xref target="RFC9293"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC9293"/> (2nd paragraph). However, it may change the way the packet is processed, i.e., SYN packets containing data might be discarded;</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in a PadN option. Indeed, the probe attribution URI can only be added to IPv6 packets in some extension headers used for the probing. However, inserting the probe description URI in PadN options could bias the measurement itself: as per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</li>
        <li>etc.</li>
      </ul>
      <t>The probe description URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the probe description URI cannot be placed at the beginning of the payload, then it should be preceded by an octet of 0x00. Inserting the probe description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU.</t>
      <t>Note: the above techniques produce a valid and legitimate packet for all the nodes forwarding the probe, except maybe for a hop-by-hop options header with a PadN option containing the probe description URI. As for the receiver, it may or may not process the packet, depending on where the probe description URI is included (e.g., TCP SYN flag with the probe description URI included in data, destination options header with a PadN option containing the probe description URI). As a consequence, a response may not be received. The choice of the probe description URI location is important and highly depends on the context, which is why multiple possibilities are proposed in this document.</t>
    </section>
    <section anchor="operational-and-technical-considerations">
      <name>Operational and Technical Considerations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on will or context. This section describes the upsides and downsides of each technique, so that probe owners or probe makers can freely decide what works best for their cases.</t>
      <t>The advantages of using the out-of-band technique are that the probing measurement is not impacted by the probe attribution but also that it is easy to setup, i.e., by running a web server on a probe device to describe the measurements. Unfortunately, there are some disadvantages too. In some cases, using the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe owner), dynamic source addresses, etc.</t>
      <t>The advantage of using the in-band technique is to cover the cases where the out-of-band technique is not possible, as listed above. The disadvantage is to potentially bias the measurements, since packets with the Probe Description URI might be discarded depending on the context.</t>
      <t>Having both the out-of-band and in-band techniques combined also has a big advantage, i.e., it could be used as an indirect means of "authenticating" the Probe Description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). While the out-of-band technique alone is less prone to spoofing, the combination with the in-band technique offers a more complete solution.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>While it is expected that only researchers with no bad intentions will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party.  As a consequence, the recipient of this information cannot trust this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9293"/>
            <seriesInfo name="RFC" value="9293"/>
            <seriesInfo name="STD" value="7"/>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, Warren Kumari, and Andrew Shaw.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
