<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-02"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Liquid Intelligent Technologies</organization>
      <address>
        <email>andrew-ietf@liquid.tech</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
      <organization>Independent</organization>
      <address>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="11"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>

<t>There is a trend towards documents describing protocols that are only intended
to be used within "limited domains".  These documents often do not clearly
define how the boundary of the limited domain is implemented and enforced,
or require that operators of these limited domains //perfectly// add filters
at all of the boundary nodes of the domain to protect the rest of the global
Internet from these protocols and vice-versa.</t>
      <t>This document discusses the concepts of "fail-open" versus "fail- closed"
protocols for limited domains. It further specifies how to use layer-2
protocol identification mechanisms for designing limited domain protocols
that are safer to deploy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides
examples of limited domains, as well as Examples of Limited Domain
Solutions, including Service Function Chaining (SFC <xref target="RFC7665"/> ), Segment
Routing, "Creative uses of IPv6 features" (including Extension
headers, e.g., for in situ Operations, Administration, and
maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively
from <xref target="RFC8799"/>, but it is assumed that the reader will actually read
<xref target="RFC8799"/> in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>This document addresses the problem of "leakage" of limited domain
protocols by providing a mechanism so that nodes must be explicitly
configured to handle the given limited-domain protocol ("fail-
closed"), rather than relying on the network operator to take active
steps to protect the boundary ("fail-open").</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-
closed".  Fail-closed protocols are those that require explicit
interface or device-wide configuration to enable them to be accepted
or processed when received on an interface.  A classic example of a
fail-closed protocol is MPLS (<xref target="RFC3031"/>): In order to allow MPLS to
transit an interface, the operator must enable the MPLS protocol on
that interface and on the device itself.  This ensures that outside
MPLS traffic does not leak in.</t>
      <t>Fail-open protocols are those that require explicit configuration in
order to ensure that they do not leak out of a domain, for example,
through the application of filters.  An example of a fail-open
protocol is SRv6 - in order to ensure that SRv6 traffic does not leak
out of a network, the operator must explicitly filter this traffic,
and, in order to ensure that SRv6 traffic does not leak in, the
operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently riskier than fail-closed
protocols, as they rely on perfect configuration of filters on all
interfaces at the boundary of a domain, and, if the filters are
removed for any reason (for example, during troubleshooting), there
is a risk of inbound or outbound leaks.  In addition, some devices or
interfaces may have limitations in the size and complexity of filters
that can be applied, and so adding new filter entries to limit leaks
of a new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering.  In order for the protocol to be accepted and processed
when received on an interface, the operator must explicitly enable
the protocol on that interface and on the device itself.  In
addition, there is less risk of operational mistakes, as it does not
rely on filters that may be limited in number and complexity.
Finally, fail-closed protocols do not require that operators of
networks outside of the limited domain implement filters to protect
their networks from the limited domain traffic.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
layer-2 protocol identifier, usually an EtherType. This mechanism is used by
MPLS.  In modern router and hosts, if such a protocol identifier is not enabled
on an interface, then the Ethernet chipset will ignore the frame, and the node
will not see or process it. Thus, it is necessary to specifically enable the
layer-2 protocol identifier on all relevant interfaces inside the limited
domain, and the protocol will be blocked at the domain boundary where the
protocol has not been so enabled. This is a simple and effective mechanism to
ensure that the protocol does not leak out of the limited domain if and when an
operator makes a mistake in configuring filters based on identifiers appearing
deeper in the frame such as IP addresses or IP protocol or header options.</t>
      <t>This layer-2 protocol identifier technique only works for transport-type
limited domain protocols (i.e., protocols running at layer 3).  Higher layer
protocols cannot necessarily be protected in this way, and so cryptographically
enforced mechanisms may need to be used instead (e.g., as done used by ANIMA in
<xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
    </section>
    <section anchor="ethernet-protocol-identification">
      <name>Ethernet Protocol Identification</name>
      <t>Figure 1 shows the general format of Ethernet frames. The relevant protocol
identification field occurs after the destination and source MAC addresses and
any tags (such a VLAN tags). The alternatives for protocol identification are
discussed in Section 3 of <xref target="RFC9542"/>.</t>
      <figure anchor="fig1">
        <name>Ethernet Frame Format</name>
        <artwork><![CDATA[
+-----------+-----------+- - - - +----------+--------- - - -+-------+
|Destination|  Source   |Optional| Protocol |  Body of      |Trailer|
|MAC Address|MAC Address|  Tags  |Identifier|   Frame        |       |
+-----------+-----------+ - - - -+----------+--------- - - -+-------|
]]></artwork>
      </figure>
      <t>This document considers EtherType protocol identification. An EtherType is an
unsigned 16-bit field in an Ethernet frame with a value in the range of 0x0600
to 0xFFFF, and so it is a somewhat limited resource; however, there exists a
special Extended EtherType (0x88B7) that can be suffixed by an Organizationally
Unique Identifier (OUI) followed by a further 16-bits identifying the protocol
relative to that OUI as discussed in Section 3 of <xref target="RFC9542"/>. These alternatives
of a direct EtherType or use of the Extended EtherType for the case of the IANA
OUI are illustrated in Figure 2. The following subsections discuss the factors
which may influence the choice between these alternatives when use of such
layer 2 protocol identification, to make the isolation of a limited domain more
robust, is warranted.</t>
      <figure anchor="fig2">
        <name>EtherType Based Protocol Identification</name>
        <artwork><![CDATA[
  01234567 01234567
+--------+--------+
|    EtherType    |
+--------+--------+
Specific EtherType

  01234567 01234567 01234567 01234567 01234567 01234567 01234567
+--------+--------+--------+--------+--------+--------+--------+
|  0x88  |  0xB7  |  0x00  |  0x00  |  0x5E  | Protocol Number |
+--------+--------+--------+--------+--------+--------+--------+
Extended EtherType|         IANA OUI         |IANA Protocol Number
]]></artwork>
      </figure>
      <t>Because specific EtherTypes are a limited resource, an Extended EtherType
<bcp14>SHOULD</bcp14> be used unless there is a strong reason why it will not work
satisfactorily and a specific EtherType is required.</t>
      <section anchor="extended-ethertype-protocol-identification">
        <name>Extended EtherType Protocol Identification</name>
        <t>The main advantage of using an Extended EtherType with an IANA Protocol Number,
as shown in Figure 2, is that such a number can be allocated by IANA with
Expert Review based on an Internet Draft and are thus relatively easy to
obtain. The main disadvantage is that the protocol identification is 5 bytes
longer than a specific dedicated EtherType.</t>
      </section>
      <section anchor="specific-ethertype-protocol-identification">
        <name>Specific EtherType Protocol Identification</name>
        <t>The primary disadvantage of using a specific EtherType, as opposed to an
Extended EtherType, is that assignment of such an EtherType is significantly
more difficult than assignment of an Extended EtherType IANA protocol number.
As discussed in <xref target="RFC9542"/>, a specific EtherType can only be assigned by the
IEEE Registration Authority under the following policy: "Since EtherTypes are a
fairly scarce resource, the IEEE RAC has let us know that they will not assign
a new EtherType to a new IETF protocol specification until the IESG has
approved the protocol specification for publication as an RFC.  In exceptional
cases, the IEEE RA is willing to consider "early allocation" of an EtherType
for an IETF protocol that is still under development as long as the request
comes from and has been vetted by the IESG." (<xref target="RFC9542"/> Appendix B.1, citing
<xref target="IESG_EtherType"/>)</t>
        <t>During development and testing, a protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>).  Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.
However, there is always a risk of some implementation using a Local
Experimental EtherType not getting updated causing conflicts with a later
different use of that experimental EtherType.</t>
        <t>The primary advantage of using a specific EtherType is the saving of 5 bytes
relative to the use of the Extended EtherType with a protocol number under the
IANA OUI.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Protocols are designated as "limited domain" because something unexpected might
happen if they leak outside of a domain with unified management. For example,
VLAN or VPN or overlay identifiers may be misinterpreted resulting in the
delivery of data to or the acceptance of data from unauthorized network nodes
violating intended security constraints. The use of a layer-2 protocol
identifier to provide a "fail closed" barrier at the domain border can
significantly improve security by eliminating the opportunity for such
misinterpretation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 301?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Brian Carpenter, for his review and comments.</t>
      <t>Also much thanks to Deborah Brungard, for her review and comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Donald Eastlake as an author.</t>
            </li>
            <li>
              <t>Substantial re-write and expansion of material concerning specific and Extended EtherType protocol identification.</t>
            </li>
            <li>
              <t>Add initial Security Considerations text.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
