<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-intarea-vulnerabilities-forged-icmp-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Cross-Layer Problem Statement">Problem Statement for Cross-Layer Vulnerabilities due to Forged ICMP Errors</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-intarea-vulnerabilities-forged-icmp-01"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Feng" fullname="Xuewei Feng">
      <organization>Tsinghua University</organization>
      <address>
        <email>fengxw06@126.com</email>
      </address>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhaoxi Li">
      <organization>Tsinghua University</organization>
      <address>
        <email>li-zx24@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>Internet Area</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>cross-layer</keyword>
    <keyword>TCP/IP</keyword>
    <keyword>vulnerabilities</keyword>
    <keyword>ICMP</keyword>
    <keyword>security</keyword>
    <abstract>
      <?line 145?>

<t>ICMP error messages are vital for network reliability, providing feedback on issues such as unreachable hosts or fragmentation requirements. They help devices adapt dynamically, support troubleshooting, and enable essential functions like Path MTU Discovery. However, off-path attackers on the Internet may forge ICMP error messages to bypass legitimate validation mechanisms, causing the victim's TCP/IP stack to misinterpret network conditions and exposing critical vulnerabilities. This document analyzes how such forged ICMP errors can be exploited by off-path attackers to induce cross-layer interactions within the victim's TCP/IP stack, leading to four classes of vulnerabilities: information leakage, desynchronization of shared variables, semantic gaps, and identity deception. These ICMP-based attacks allow off-path attackers to manipulate network traffic, disrupt communication flows, and compromise both infrastructure and user privacy, without being on the direct communication path. The document concludes with proposed countermeasures and recommendations for protocol evolution.</t>
    </abstract>
  </front>
  <middle>
    <?line 149?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ICMP error messages constitute a fundamental component of the Internet control architecture<xref target="RFC792"/>. These messages serve as critical feedback mechanisms that inform endpoints and intermediate devices about various network conditions, including unreachable destinations, routing failures, and packet fragmentation requirements<xref target="RFC1122"/>. By enabling dynamic adjustments in response to network conditions, ICMP error messages contribute to maintaining the reliability, efficiency, and robustness of end-to-end communication. Without this essential feedback channel, numerous critical protocols and diagnostic tools, including Path MTU Discovery and traceroute, would be substantially impaired.</t>
      <t>ICMP error messages present inherent validation challenges. This issue becomes particularly pronounced when the ICMP error contains a payload from a stateless protocol, such as UDP or ICMP. In such scenarios, the receiving host frequently lacks sufficient context to determine whether the error message corresponds to a legitimate packet it previously transmitted. Since UDP does not maintain per-flow state at the transport layer, the absence of session semantics renders it difficult to verify the authenticity and relevance of the ICMP error, thereby creating opportunities for potential exploitation.</t>
      <t>The inherent difficulty in validating ICMP errors creates a significant attack vector for off-path adversaries. By forging ICMP error messages that appear to target legitimate traffic, adversaries can deceive recipients into misinterpreting network conditions. These forged messages can trigger complex cross-layer interactions within the TCP/IP stack -- particularly when they reference stateless protocols -- causing systems to react in unintended ways. Such manipulation can result in serious vulnerabilities, including information disclosure, denial of service, or traffic misdirection. Crucially, these attacks do not require the adversary to intercept or observe actual traffic, enabling covert exploitation of protocol semantics from remote Internet positions.</t>
      <t>These ICMP-based attack vectors enable multiple exploitation scenarios:</t>
      <ol spacing="normal" type="1"><li>
          <t>Information disclosure, where adversaries observe system responses to ICMP error messages to infer internal state such as TCP sequence numbers or IP Identification (IPID) values;</t>
        </li>
        <li>
          <t>State desynchronization, where ICMP messages create inconsistencies in shared variables such as MTU between protocol layers, resulting in fragmentation errors or packet drops;</t>
        </li>
        <li>
          <t>Semantic validation gaps, where stateless protocols accept ICMP control messages without adequate validation mechanisms to verify the legitimacy of diverse protocol data;</t>
        </li>
        <li>
          <t>Source authentication failures, where ICMP packets impersonate legitimate network devices without proper authentication, deceiving targets into accepting malicious routing or control information.</t>
        </li>
      </ol>
      <t>The effectiveness of these attacks stems from the implicit trust protocols place in cross-layer communications and the difficulty of validating control message authenticity across protocol boundaries<xref target="ACM2025TCPIP"/>. This document follows the problem statement methodology outlined in <xref target="RFC4336"/>, which provides guidance for identifying and classifying protocol vulnerabilities in cross-layer interactions.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>This document focuses on vulnerabilities that can be exploited by off-path attackers-adversaries who are not positioned on the direct communication path between a client and a server. Unlike on-path attackers who can intercept, modify, or drop packets in transit, off-path attackers operate from external network locations and lack the ability to directly eavesdrop on or manipulate legitimate traffic flows. However, they retain the capability to inject spoofed packets into the network, making them a significant threat to protocol security.</t>
      <t>The off-path threat model represents a realistic and prevalent attack scenario in modern networks. Off-path attackers can operate from anywhere on the Internet, including compromised hosts, botnets, or even legitimate network positions that are simply not on the target communication path. This positioning makes detection more challenging and expands the potential attack surface significantly compared to on-path attacks, which require the attacker to be strategically positioned between communicating endpoints.</t>
      <figure>
        <name>Off-Path Attack Model</name>
        <artwork><![CDATA[
      Off-Path Threat model:

      +---------+        +-------------+        +---------+
      | Server  |--------+  Internet   +--------+ Client  |
      +---------+        +------+------+        +---------+
                                |
                                | Spoofed ICMP
                                |
                           +----+----+
                           |Off-Path |
                           |Attacker |
                           +---------+
]]></artwork>
      </figure>
      <t>In this threat model, the attacker leverages the ability to send spoofed IP packets-particularly ICMP messages-to trigger cross-layer vulnerabilities within the target's network stack. By forging source IP addresses, the attacker can impersonate trusted entities such as routers, servers, or network infrastructure components. These spoofed packets appear legitimate at the network layer and can successfully traverse network paths to reach their intended targets.</t>
      <t>The fundamental assumption underlying many protocol designs is that packets arriving from the network layer carry implicit trust regarding their origin and legitimacy. However, protocol implementations <bcp14>SHOULD NOT</bcp14> blindly trust such packets. This assumption becomes a critical vulnerability in the off-path attack model, where malicious packets can be crafted to exploit cross-layer interactions without requiring the attacker to compromise the direct communication path<xref target="RFC5927"/>. The resulting attacks can violate protocol semantics, disrupt ongoing communications, or manipulate system behavior while remaining difficult to detect and attribute.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Four distinct classes of vulnerabilities -- Cross-Layer Information Disclosure, Cross-Layer State Desynchronization, Cross-Layer Semantic Validation Deficiencies, and Cross-Layer Source Authentication Failures -- can emerge from cross-layer interactions within the TCP/IP protocol suite. These vulnerabilities stem from fundamental architectural assumptions, shared state management deficiencies, and the absence of robust cross-layer validation mechanisms. Protocol designers <bcp14>SHOULD</bcp14> carefully evaluate cross-layer interactions to minimize such risks.</t>
      <section anchor="cross-layer-information-disclosure">
        <name>Cross-Layer Information Disclosure</name>
        <t>This vulnerability arises when observable fields in one protocol layer expose information that is semantically or cryptographically bound to another layer. Specifically, when a protocol assigns values to a field based on internal or high-layer state-such as counters or identifiers-that field may serve as an unintentional side channel. If this field is externally observable, an entity without access to internal state can correlate changes in its value to infer sensitive information, undermining the isolation between protocol layers.</t>
        <t>The underlying cause of this vulnerability lies in the lack of entropy separation across protocol layers. When the state generation logic of a lower-layer protocol is influenced by, or derived from, upper-layer state-either directly or indirectly-observable behavior at the lower layer may unintentionally reveal sensitive upper-layer information. This creates a channel through which confidential state can be inferred by external observers. Furthermore, if protocol behavior permits external stimuli (such as control-plane messages) to affect the internal assignment policies of protocol fields, the risk of information leakage is significantly amplified. Fields originally designed for operational purposes at the network layer may, under such conditions, become conduits for exposing transport-layer state, thereby undermining confidentiality and weakening protocol-layer security guarantees such as sequence number randomization<xref target="RFC4086"/>.</t>
        <t>A notable instance of this phenomenon is the coupling between the IP Identification (IPID) field and the TCP sequence number space. Although the IPID field was originally introduced to support IP-layer fragmentation and reassembly, certain implementations assign its value in ways that are indirectly influenced by active TCP session states. In some systems, off-path attackers can manipulate this assignment logic-e.g., by sending crafted ICMP errors-to trigger changes in the IPID generation behavior. By observing variations in IPID values, attackers can infer whether their injected TCP packets contain correct or incorrect sequence numbers, thereby learning the valid sequence number and enabling off-path TCP session hijacking <xref target="CCS2020IPID"/>.</t>
        <figure>
          <name>IPID-Based Connection Inference Attack</name>
          <artwork><![CDATA[
    Attacker                Victim Server              Victim Client
    --------                -------------              -------------
       |                         |                         |
       |---(1) ICMP "Frag.------>|  (Action: Clear DF      |
       |      Needed"            |   Flag, Use Hash-based  |
       |      (src=attacker)     |   IPID)                 |
       |                         |                         |
       |---(2) Probe Request---->|                         |
       |<--(3) Probe Reply-------|                         |
       |      (IPID=x)           |                         |
       |                         |                         |
       |                         |<--------(4) SYN---------|
       |                         |                         |
       |                         |---(5) SYN/ACK---------->|
       |                         |      (IPID=x+1)         |
       |                         |   (Shared IPID          |
       |                         |    increments)          |
       |                         |                         |
       |---(6) Probe Request---->|                         |
       |<--(7) Probe Reply-------|                         |
       |      (IPID=x+2)         |                         |
       | (Attacker observes      |                         |
       |  IPID jump)             |                         |
]]></artwork>
        </figure>
      </section>
      <section anchor="cross-layer-state-desynchronization">
        <name>Cross-Layer State Desynchronization</name>
        <t>Protocols within the same stack frequently operate on shared global variables, such as metrics related to path properties, endpoint capabilities, or buffer dimensions. When these variables are updated asynchronously or within layer-specific contexts, state inconsistencies may arise. These shared variables are often used by multiple layers to make decisions, leading to potential conflicts or discrepancies if updates are not properly synchronized. State desynchronization occurs when one layer updates a shared variable in response to a specific event, while other dependent layers are either unaware of the update or unable to reflect the change immediately.</t>
        <t>This type of vulnerability is characterized by temporal or contextual divergence in the interpretation of shared data. Such divergence can occur when network or transport layers rely on outdated or inconsistent information due to the asynchronous nature of updates across layers. For instance, a network-layer parameter such as Maximum Transmission Unit (MTU), which is updated in response to a control-plane input or a network change, may not immediately be propagated to the transport layer. As a result, the transport layer may continue to operate under the assumption of an outdated MTU, which can lead to improper handling of data fragments or errors in packet transmission.</t>
        <t>A concrete example of this vulnerability can be seen in the interaction between the TCP and IP layers concerning Path MTU Discovery (PMTUD). When an attacker sends a forged ICMP fragmentation-needed packet to manipulate the Path MTU (PMTU), the newly updated PMTU may not be immediately propagated to the transport layer, which continues to operate under the assumption of the previous, higher MTU value. This desynchronization can cause TCP to generate packets that exceed the updated MTU, resulting in unintended fragmentation at points where fragmentation is prohibited, or packet drops in environments where fragmentation is not supported.</t>
        <t>Such cross-layer inconsistencies disrupt data transmission, violate TCP's non-fragmentation assumptions, and introduce operational errors including communication delays and packet loss. Implementations <bcp14>SHOULD</bcp14> ensure that updates to shared variables are properly synchronized across protocol layers. More critically, this vulnerability enables attackers to exploit IP fragmentation mechanisms to inject malicious packets and potentially hijack TCP connections <xref target="NDSS2022MTU"/>. The lack of proper synchronization between layers in handling shared path properties like MTU creates significant security vulnerabilities within the protocol stack, exposing systems to both denial-of-service and session hijacking attacks.</t>
        <figure>
          <name>IP Fragment Injection Attack</name>
          <artwork><![CDATA[
   Attacker                Victim Server              Victim Client
   --------                -------------              -------------
      |                         |                         |
      |---(1) Infer TCP-------->|                         |
      |      Connection         |                         |
      |                         |                         |
      |---(2) Trigger IP------->|                         |
      |      Fragmentation      |                         |
      |                         |                         |
      |-----------(3) Forge & Inject IP Fragment--------->|
      |                         |                         |
      |                         |<--(4) Legitimate--------|
      |                         |      IP Fragments       |
      |                         |                         |
      |                         |   (5) Mis-reassemble    |
      |                         |       Packet            |
      |                         |   (Forged + Legitimate) |
      |                         |                         |
]]></artwork>
        </figure>
      </section>
      <section anchor="cross-layer-semantic-validation-deficiencies">
        <name>Cross-Layer Semantic Validation Deficiencies</name>
        <t>Protocols often depend on implicit assumptions about the structure and statefulness of adjacent protocol layers. When a protocol receives cross-layer input containing data attributed to another protocol, it may attempt validation based on limited semantic knowledge or incomplete contextual information. If the incoming data originates from a stateless or loosely specified layer, or lacks integrity guarantees, the receiving protocol faces significant challenges in determining data legitimacy. This fundamental limitation creates vulnerabilities when protocol validation processes prove inadequate for ensuring the authenticity and integrity of cross-layer communications.</t>
        <t>This semantic validation gap becomes particularly exploitable when protocols rely on partial data representations, such as fixed-length headers or truncated payloads, for legitimacy assessment. Protocols often implement basic checksums or header-based validation mechanisms without considering the full operational context or semantic meaning of the data. This creates opportunities for attackers to craft malicious packets that conform syntactically to expected formats while semantically violating intended operational contexts. Such carefully crafted malformed packets can trigger unintended state transitions, erroneous control decisions, or inconsistent processing behaviors that diverge from correct protocol logic.</t>
        <t>A concrete illustration of this vulnerability emerges in the handling of forged ICMP redirect messages targeting stateless protocols such as UDP. ICMP redirect messages are legitimate network control packets used by routers to inform hosts about more optimal routing paths. However, stateless protocols like UDP cannot maintain session state or establish trust relationships for their connections, making direct validation of ICMP control messages impossible. Attackers exploit this validation gap by crafting and injecting malicious ICMP redirect messages with spoofed source addresses, deceiving target hosts into redirecting their traffic through attacker-controlled gateways <xref target="USENIXSECURITY2023ICMP"/>. This enables sophisticated man-in-the-middle attacks where adversaries can intercept, modify, or redirect network traffic without being positioned on the original communication path. The fundamental vulnerability stems from the absence of stateful correlation mechanisms and authenticity validation across protocol layer boundaries, allowing forged control messages to manipulate legitimate network behavior.</t>
        <figure>
          <name>ICMP Redirect Traffic Hijacking Attack</name>
          <artwork><![CDATA[
    Attacker      Neighbor Host      Victim           Destination
    --------      -------------      ------           -----------
       |                |               |                  |
       |--(1) Detects-->|               |                  |
       |    Neighbor    |               |                  |
       |    Host        |               |                  |
       |                |               |                  |
       |-------(2) Forge UDP Datagrams-------------------->|
       |                |               |                  |
       |                |               |---(3) Establish->|
       |                |               |   UDP Socket     |
       |                |               |                  |
       |-------(4) Forge ICMP Redirect-------------------->|
       |                |               |                  |
       |                |        (5) Check Passed          |
       |                |               |                  |
       |                |<-----(6) Redirected Traffic------|
       |                |               |                  |
       |                |--(7) Discard--|                  |
       |                |    Traffic X  |                  |
       |                |               |                  |
       |                |               |      (8)   No Response
       |                |               |            Received
]]></artwork>
        </figure>
      </section>
      <section anchor="cross-layer-source-authentication-failures">
        <name>Cross-Layer Source Authentication Failures</name>
        <t>Cross-layer interactions often rely on implicit trust assumptions regarding the provenance and authenticity of received data, particularly when control messages or routing information traverses protocol layer boundaries. Protocol implementations typically operate under the assumption that data originating from lower layers-including control messages, routing updates, and error notifications-carries inherent legitimacy, provided it conforms to expected syntactic formats and protocol specifications. However, this fundamental trust assumption creates a critical vulnerability when protocols accept cross-layer input without implementing robust mechanisms to verify the authentic origin or validate the association with established communication contexts. Under such circumstances, protocols become susceptible to identity deception attacks, where malicious entities can successfully impersonate legitimate network components or communication peers.</t>
        <t>This vulnerability emerges from the systematic absence of cryptographic authentication frameworks and contextual validation mechanisms that would otherwise establish secure bindings between data sources and trusted communication relationships. The lack of comprehensive identity verification enables malicious actors to exploit these authentication gaps by injecting carefully crafted ICMP packets and other spoofed control messages into legitimate communication flows, effectively masquerading as authoritative network infrastructure components such as routers, gateways, or access points. The severity of this vulnerability is further amplified when underlying network infrastructure-including forwarding engines, hardware accelerators, and intermediate processing nodes-fails to enforce stringent access control policies or implement comprehensive provenance verification before relaying control messages to higher protocol layers. Consequently, maliciously crafted ICMP packets can propagate through the network stack unchecked, systematically undermining the integrity and trustworthiness of the entire communication system.</t>
        <t>The propagation of these unverified ICMP control messages can trigger cascading security failures, including unauthorized reconfiguration of forwarding behaviors, systematic disruption of established communication flows, illegitimate privilege escalation within protocol stacks, and ultimately comprehensive compromise of network reliability and security. These attacks leverage the inherent trust protocols place in ICMP control messages, exploiting the fundamental assumption that such messages originate from legitimate network infrastructure.</t>
        <t>A concrete manifestation of this vulnerability can be observed in sophisticated attacks against Wi-Fi networks, where adversaries deploy malicious terminals to impersonate legitimate Access Points (APs) while simultaneously injecting forged ICMP redirect messages. In this attack scenario, the malicious entity exploits the implicit trust that Wi-Fi-enabled devices place in both wireless control frames and ICMP network control messages. By strategically crafting and transmitting spoofed ICMP redirect packets alongside fraudulent wireless association messages, attackers can systematically deceive target devices into redirecting their network traffic through attacker-controlled infrastructure. This multi-vector approach enables sophisticated man-in-the-middle attacks that combine wireless protocol exploitation with ICMP-based traffic manipulation, allowing adversaries to intercept, modify, or redirect victim communications while maintaining the appearance of legitimate network operation <xref target="SP2023MITM"/>. The effectiveness of these attacks stems from the fundamental vulnerability in cross-layer trust assumptions and the absence of robust authentication mechanisms for verifying the identity of ICMP message sources.</t>
        <figure>
          <name>Wireless Network Routing Cache Poisoning</name>
          <artwork><![CDATA[
    Attacker      Victim Supplicant       AP           Server
    --------      -----------------       --           ------
       |                 |                |              |
       |                 |                |              |
       |-(1.1) Ping----->|                |              |
       |  (src=Server)   |                |              |
       |                 |-(1.2) Ping---->|------------->|
       |                 |    Reply       |              |
       |                 | (Action: Create|              |
       |                 |  Routing Cache)|              |
       |                 |                |              |
       |-(1.3) UDP Port->|                |              |
       |    Probe        |                |              |
       |<-(1.4) ICMP-----|                |              |
       |    Port         |                |              |
       |    Unreachable  |                |              |
       | (Attacker finds |                |              |
       |  open port)     |                |              |
       |                 |                |              |
       |                 |                |              |
       |-(2.1) ICMP----->|                |              |
       |    Redirect     |                |              |
       | (src=AP, with   |                |              |
       |  forged UDP for |                |              |
       |  check evasion) |                |              |
       |                 |                |              |
       |         (2.2) Action: Routing Cache is Poisoned,|
       |               Attacker becomes the next-hop.    |
       |                 |                |              |
       |                 |                |              |
       |<-(3.1) Redirect-|                |              |
       |    Traffic      |                |              |
       | ("I like you,   |                |              |
       |  server Bob!")  |                |              |
       |                 |                |              |
       |-(3.2) Falsified>|------------------------------>|
       |    Traffic      |                |              |
       | ("I hate you,   |                |              |
       |  server Bob!")  |                |              |
       |                 |                |              |
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="mitigation-directions">
      <name>Mitigation Directions</name>
      <t>The vulnerabilities arising from cross-layer interactions can be mitigated according to the following directions:</t>
      <t>First, enhancing data provenance validation across protocol layers is crucial. By introducing robust mechanisms to authenticate the source of control messages and routing information, implementations <bcp14>SHOULD</bcp14> prevent unauthorized entities from injecting malicious data into the network. This may involve integrating cryptographic signatures or contextual authentication protocols that verify the identity of the sender and the legitimacy of the message. For example, each control message can be signed with a cryptographic key, and the recipient protocol layer would validate the signature before processing the message. This ensures that the data originates from a trusted source and has not been tampered with in transit.</t>
      <t>Second, enforcing stronger access control and provenance checks at lower protocol layers is essential. The underlying infrastructure, such as routers, access points, and hardware accelerators, should be designed to perform rigorous checks on all control messages before passing them to higher layers. This includes verifying the authenticity of the source and ensuring that the message belongs to a valid communication context. By placing these checks at the network layer or physical layer, we can prevent malicious control messages from propagating up to higher layers, where they could potentially cause misconfigurations or elevate an attacker's privileges.</t>
      <t>Finally, introducing more granular trust models for cross-layer communications can reduce reliance on implicit trust. Instead of assuming that data from lower layers is always trustworthy, protocols can establish explicit trust relationships that govern interactions between layers. This could involve using a combination of contextual information, such as previous successful communication sessions, coupled with cryptographic mechanisms that ensure data integrity. For instance, transport layer protocols could require secure key exchange with the network layer before accepting control messages. This approach ensures that only trusted entities can send sensitive control information and prevents malicious actors from exploiting the cross-layer trust assumptions.</t>
      <t>These directions provide a framework for securing cross-layer interactions by ensuring that data flows between layers are properly validated and authenticated, reducing the risk of identity deception and unauthorized control. By implementing these strategies, we can significantly enhance the overall security of protocol stacks and protect against attacks that exploit cross-layer vulnerabilities.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document identifies security vulnerabilities in cross-layer interactions within the TCP/IP protocol suite. The vulnerabilities described-cross-layer information disclosure, cross-layer state desynchronization, cross-layer semantic validation deficiencies, and cross-layer source authentication failures-represent significant threats to network security that require careful consideration in protocol design and implementation.</t>
      <t>The security implications of these vulnerabilities extend beyond individual protocol layers to affect the overall integrity and trustworthiness of network communications. Implementers and protocol designers <bcp14>SHOULD</bcp14> consider the mitigation strategies outlined in this document when developing new protocols or updating existing ones.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC5927">
          <front>
            <title>ICMP Attacks against TCP</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Additionally, this document describes a number of widely implemented modifications to TCP's handling of ICMP error messages that help to mitigate these issues. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5927"/>
          <seriesInfo name="DOI" value="10.17487/RFC5927"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC4336">
          <front>
            <title>Problem Statement for the Datagram Congestion Control Protocol (DCCP)</title>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Kohler" initials="E." surname="Kohler"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes for the historical record the motivation behind the Datagram Congestion Control Protocol (DCCP), an unreliable transport protocol incorporating end-to-end congestion control. DCCP implements a congestion-controlled, unreliable flow of datagrams for use by applications such as streaming media or on-line games. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4336"/>
          <seriesInfo name="DOI" value="10.17487/RFC4336"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="ACM2025TCPIP" target="https://cacm.acm.org/research/exploiting-cross-layer-vulnerabilities-off-path-attacks-on-the-tcp-ip-protocol-suite/">
          <front>
            <title>Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="J." surname="Wu" fullname="Jianping Wu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="CCS2020IPID" target="https://dl.acm.org/doi/abs/10.1145/3372297.3417884">
          <front>
            <title>Off-path TCP exploits of the mixed IPID assignment</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="C." surname="Fu" fullname="Chuanpu Fu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="NDSS2022MTU" target="https://www.ndss-symposium.org/ndss-paper/auto-draft-185/">
          <front>
            <title>PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="B." surname="Liu" fullname="Baojun Liu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="X." surname="Zheng" fullname="Xiaofeng Zheng">
              <organization>Tsinghua University, Qi An Xin Group</organization>
            </author>
            <author initials="Q." surname="Yang" fullname="Qiushi Yang">
              <organization>Qi An Xin Group</organization>
            </author>
            <author initials="H." surname="Duan" fullname="Haixin Duan">
              <organization>Tsinghua University, Qi An Xin Group</organization>
            </author>
            <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
              <organization>UC Riverside</organization>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="SP2023MITM" target="https://ieeexplore.ieee.org/document/10179441">
          <front>
            <title>Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="Y." surname="Yang" fullname="Yuxiang Yang">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2023" month="May"/>
          </front>
        </reference>
        <reference anchor="USENIXSECURITY2023ICMP" target="https://www.usenix.org/conference/usenixsecurity22/presentation/feng">
          <front>
            <title>Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks</title>
            <author initials="X." surname="Feng" fullname="Xuewei Feng">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="Q." surname="Li" fullname="Qi Li">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <author initials="K." surname="Sun" fullname="Kun Sun">
              <organization>George Mason University</organization>
            </author>
            <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
              <organization>UC Riverside</organization>
            </author>
            <author initials="G." surname="Zhao" fullname="Gang Zhao">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="X." surname="Kuang" fullname="Xiaohui Kuang">
              <organization>Beijing University of Posts and Telecommunications</organization>
            </author>
            <author initials="C." surname="Fu" fullname="Chuanpu Fu">
              <organization>Tsinghua University</organization>
            </author>
            <author initials="K." surname="Xu" fullname="Ke Xu">
              <organization>Tsinghua University, Zhongguancun Laboratory</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 402?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank the IETF community, particularly members of the ICMP and Security Working Groups, for their valuable feedback and insights during the development of this proposal. Special thanks to the contributors who provided research findings that form the foundation of this analysis.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
