<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-01"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Liquid Intelligent Technologies</organization>
      <address>
        <email>andrew-ietf@liquid.tech</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>There is a trend towards documents describing protocols that are only intended
to be used within "limited domains". These documents often do not
clearly define how the boundary of the limited domain is implemented and
enforced, or require that operators of these limited domains //perfectly//
implement filters to protect the rest of the global Internet from these protocols
and vice-versa.</t>
      <t>This document discusses the concepts of "fail-open" versus "fail-closed"
protocols and limited domains, and specifies a layer-2 mechanism that
can be used for designing limited
domain protocols that are safer to deploy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides examples of
limited domains, as well as Examples of Limited Domain Solutions, including
Service Function Chaining (SFC), Segment Routing, "Creative uses of IPv6
features" (including Extension headers, e.g., for in situ
Operations, Administration, and maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively from
<xref target="RFC8799"/>, but it is assumed that the reader will actually
read <xref target="RFC8799"/> in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>This document addresses the problem of "leakage" of limited domain protocols by
providing a mechanism so that nodes must be explicitly configured to handle the
given limited-domain protocol ("fail-closed"), rather than relying on the
network operator to take active steps to protect the boundary ("fail-open").</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-closed".
Fail-closed protocols are those that require explicit interface
or device-wide configuration to enable
them to be accepted or processed when received on an interface.
A classic example of a fail-closed protocol is
MPLS (<xref target="RFC3031"/>): In order to allow MPLS to transit an interface, the
operator must enable the MPLS protocol on that interface and on the
device itself. This ensures
that
outside MPLS traffic does not leak in.</t>
      <t>Fail-open protocols are those that require explicit configuration in order
to ensure that they do not leak out of a domain, for example, through the
application of filters. An example of a fail-open protocol is SRv6 - in order
to ensure that SRv6 traffic does not leak out of a network, the operator must
explicitly filter this traffic, and, in order to ensure that SRv6 traffic does
not leak in, the operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently more risky than fail-closed protocols, as
they rely on perfect configuration of
filters on all interfaces at the boundary of a domain, and, if the filters are
removed for any reason (for example, during troubleshooting), there
is a risk of inbound or oubound leaks.
In addition, some devices or interfaces may have limitations in the size
and complexity of filters that
can be applied, and so adding new filter entries to limit leaks of a
new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering. In order for the protocol to be accepted and processed
when received on an interface, the operator must
explicitly enable the protocol on that interface and on the device itself.
In addition, there is less risk of operational mistakes,
as it does not rely on filters that may be limited in
number and complexity. Finally, fail-closed protocols
do not require that operators of networks outside of the
limited domain implement filters to protect their networks from the limited
domain traffic.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
EtherType (this is the mechanism used by MPLS). In modern router and hosts, if
the protocol (and so its associated EtherType) is not enabled on an interface,
then the Ethernet chipset will ignore the frame, and the node OS will not
process it. This is a very simple and effective mechanism to ensure that the
protocol does not leak out of the limited domain if and when an operator makes
a mistake in configuring filters.</t>
      <t>Note that this only works for transport-type limited domain protocols (i.e.,
protocols running at layer 3). Higher layer protocols cannot necessarily be
protected in this way, and so cryptographically enforced mechanisms may need to
be used instead (e.g as  done used by ANIMA in <xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
      <t>The EtherType is a 16-bit field in an Ethernet frame, and so it is a somewhat
limited resource.</t>
      <t>Note that "Since EtherTypes are a fairly scarce resource, the IEEE RAC has let
   us know that they will not assign a new EtherType to a new IETF protocol
   specification until the IESG has approved the protocol specification for
   publication as an RFC.  In exceptional cases, the IEEE RA is willing to
   consider "early allocation" of an EtherType for an IETF protocol that is
   still under development as long as the request comes from and has been
   vetted by the IESG." (<xref target="I-D.ietf-intarea-rfc7042bis"/> Appendix B.1, citing
   <xref target="IESG_EtherType"/>)</t>
      <t>During development and testing, the protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>). Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.</t>
      <t>For discussion: or simply defining one single EtherType for this testing?
I.e., IPv4 and IPv6 can be identified by their first 4 bits.</t>
      <t>[ Editor note: EtherTypes are a scarce resource, and so we need to be
careful about how we use them. It is likely that there will only
be a very limited (sorry!) number of protocols that need to be protected in
this way (on the order of 3 or 4).</t>
      <t>However, it is worth considering if there are other ways to achieve the same
goal. An option would be to set aside a single EtherType, and then have a
registry of "limited sub-EtherTypes" that are assigned by IANA. This would
allow us to protect a large number of protocols, while only using a single
EtherType, but would require something that looks more like a new L2 header. ]</t>
      <t>Another option to make a limited-domain protocol fail-closed is to use an
identifier under the IANA OUI (00-00-5E) as explained in <xref target="RFC9542"/>.</t>
      <t>[Editor note: This is a good idea, but it is not clear if it is practical. This
above would need a bunch more text / discussion. It ends up being a bit like
the "limited sub-EtherTypes" idea above, but with the additional complexity of
not having the MAC address be the "normal" MAC address of the device that you
are sending the traffic to. This will require more discussion with the WG, and
the IEEE liaisons. ]</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="I-D.ietf-intarea-rfc7042bis">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Joe Abley" initials="J." surname="Abley">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="6" month="November" year="2023"/>
            <abstract>
              <t>   Some IETF protocols make use of Ethernet frame formats and IEEE 802
   parameters.  This document discusses several aspects of such
   parameters and their use in IETF protocols, specifies IANA
   considerations for assignment of points under the IANA OUI
   (Organizationally Unique Identifier), and provides some values for
   use in documentation.  This document obsoletes RFC 7042.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-rfc7042bis-11"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 245?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Brian Carpenter, for his review and comments.</t>
      <t>Also much thanks to Deborah Brungard, for her review and comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
