<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC4271 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
<!ENTITY RFC7682 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7682.xml">
<!ENTITY RFC6811 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6811.xml">
<!ENTITY RFC8205 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
]>


<rfc ipr="trust200902" docName="draft-giuliano-blocking-considerations-00" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Blocking Considerations">Regional Internet Blocking Considerations</title>

    <author initials="L." surname="Giuliano" fullname="Lenny Giuliano">
      <organization></organization>
      <address>
        <email>lenny@lenny.net</email>
      </address>
    </author>
    <author initials="M." surname="Aelmans" fullname="Melchior Aelmans">
      <organization></organization>
      <address>
        <email>melchior@aelmans.eu</email>
      </address>
    </author>
    <author initials="T." surname="Li" fullname="Tony Li">
      <organization></organization>
      <address>
        <email>tony.li@tony.li</email>
      </address>
    </author>

    <date year="2022" month="March" day="07"/>

    <area>INT</area>
    <workgroup>intarea</workgroup>
    <keyword>blocking, filtering, policy</keyword>

    <abstract>


<t>Geopolitical conflicts can cause policy makers to question whether or
not blocking the Internet connectivity for an opposing region is a
constructive tactic. This document provides an overview of the various
technologies that can be used to implement regional blocking of
Internet connectivity and discusses the implications of these
options. This document does not advocate any policy or given blocking
mechanism, but does attempt to articulate the implications of these
blocking technologies for policy makers.  The document also intends to
help inform policy makers from countries who could be exposed to such
blocking techniques on the implications of these methods.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Geopolitical conflicts can cause policy makers to question whether or
not blocking the Internet connectivity for an opposing region is a
constructive tactic. This document provides an overview of the various
technologies that can be used to implement regional blocking of
Internet connectivity and discusses the implications of these
options. This document does not advocate any policy or given blocking
mechanism, but does attempt to articulate the implications of these
blocking technologies for policy makers. The document also intends to
help inform policy makers from countries who could be exposed to such
blocking techniques on the implications of these methods.</t>

<t>The content expressed in this document solely reflects the views of the
authors and do not necessarily reflect the views or positions of any
of our organizations, affiliates, friends, or enemies.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="scope"><name>Scope</name>

<t>The scope of this document it limited to a description of well-known
methods for disrupting core Internet services including physical
cabling, Internet routing, filtering, and the Domain Name System.</t>

<t>The document does not intend to give any political directions or
advocate for implementing the described methods, nor does it intend to
be a guide for malicious attackers hence it will purely describe
concepts and does not provide actual configuration or implementation
methods.</t>

</section>
<section anchor="disconnection-methods"><name>Disconnection Methods</name>

<t>There are many ways of blocking a region's Internet connectivity. In
this section, we discuss some of them, their implications,
capabilities, advantages, and disadvantages.</t>

<section anchor="physical-layer"><name>Physical layer</name>

<t>Disconnection at the physical layer is the most definitive
method. Cutting cables and severing fibers will most definitely stop
bits from passing. Unfortunately, this approach is also the most
expensive to repair. In the optimistic view that disconnection is only
intended to be temporary, creating downstream costs of physical repair
is distinctly suboptimal. This approach may also be selected by the
unscrupulous who have physical access to the media, but do not have
further physical or managerial access.</t>

<t>A less destructive physical layer disconnection is simply
disconnecting the fiber or cable, either at the terminating device,
optical module, patch panel, amplifier, repeater, or transponder. This
is easily repaired, but still requires physical access. Unscrupulous
parties that wish to prevent easy repairs would be unlikely to select
this option.</t>

<t>The simplest physical layer disconnection is administrative
shutdown. Managerially disabling a physical circuit is a trivial
configuration option that will sever communications. It is trivial to
revert.</t>

</section>
<section anchor="routing-layer"><name>Routing layer</name>

<t>The Internet is a collection of many enterprises, web and cloud
hosting, access-providers, etc. networks connected to each other using
the Border Gateway Protocol (BGP) <xref target="RFC4271"/> to exchange routing
information between those networks.</t>

<t>The simplest explanation of how BGP works is to compare it to a group
of networks using the earlier described physical connections to gossip
with each other on their knowledge about their own and neighboring
networks. In other words, they exchange routing information describing
how to reach destinations on the Internet.</t>

<t>Connected entities play different roles in this ecosystem, some will
know how to reach all destinations on the Internet. These networks are
so-called Tier 1 providers and provide connectivity to Tier 2 and Tier
3 networks. They offer services on a global scale and connect
thousands of networks.</t>

<t>Tier 2 providers are large regional or national operators (for example
the national service providers) offering services in country or
regional. They have connections to many other networks, provide
services to Tier 3 networks, but also purchase services from Tier 1
networks to reach destinations on the Internet they cannot reach
themselves.</t>

<t>Tier 3 providers don’t provide routing information knowledge to other
networks and are dependent from Tier 1 and Tier 2 networks to reach
destinations on the Internet. In this category are small service
providers or webhosting providers.</t>

<t>The BGP protocols offers several options to manipulate the routing
information that is exchanged between these networks.</t>

<section anchor="autonomous-system-number-filtering"><name>Autonomous System Number Filtering</name>

<t>Networks participating in the exchange of routing information with
other networks use unique Autonomous System Numbers (ASNs) to identify
themselves. These numbers are assigned to them by the Regional
Internet Registries.</t>

<t>The ASN is used to construct a path to a destination prefix on the
Internet. For example, a Tier 1 advertises its prefix to a Tier 2
originating from its own ASN. Next the Tier 2 advertises the prefix to
a Tier 1 and adds its own ASN to the path. The route to reach this prefix
now looks as follows: ASN2 ASN1.</t>

<t>As networks are highly connected there are many ASN paths through the
Internet to reach destinations. The ‘further away’ the destination is
the longer the ASN path will be. On average most destinations on the
Internet are reachable in a maximum of 5 hops. In other words, most
destinations on the Internet can be reached via a maximum of 5
networks.</t>

<t>Networks that have a need to filter out another network with which
they don’t have a direct peering session completely have, next to
filtering prefixes, the option to filter on ASN. When applying an ASN
filter, it will filter out all prefixes originating from that specific
ASN.</t>

<t>Mitigating ASN filtering requires similar measures as mitigating
prefix filters; networks with many upstream connections to Tier 1 and
2 networks will have a much lower chance of being completely filtered
as, if one out of many upstream peers filters the ASN (and so its
originating prefixes), others might still propagate them. This could
still result in prefixes not being globally reachable anymore, but the
chances are much lower.</t>

</section>
<section anchor="de-peering"><name>De-peering</name>

<t>BGP uses a TCP session between two networks to exchange routing
information. Such a session is called a peering session. Disabling
such a session is referred to as de-peering.</t>

<section anchor="de-peering-tier-3-networks"><name>De-peering Tier 3 networks</name>

<t>In many cases Tier 3 networks are using a single Tier 1 or 2 network
for their connectivity to the Internet. In that case it’s relatively
easy to disconnect such networks from the Internet by disabling their
peering sessions on the Tier 1 or 2 side.</t>

</section>
<section anchor="de-peering-tier-2-networks"><name>De-peering Tier 2 networks</name>

<t>As described earlier these networks have multiple connections to other
Tier 2 providers and typically between 2-8 Tier 1 providers to provide
connectivity to the Internet. Subsequently, they could also receive
routing information via Internet Exchange Points giving them even more
options to reach destinations on the Internet.</t>

<t>De-peering such a network is much harder as one would need to disable
peering sessions in many networks and at multiple (probably
international) locations. Tier 2 networks will likely have
international connections as well. Pursuing networks to disable
these peering sessions in another jurisdiction could be very
complicated.</t>

</section>
<section anchor="de-peering-tier-1-networks"><name>De-peering Tier 1 networks</name>

<t>By their nature, Tier 1 networks have global span and have thousands
of connections with other Tier 1, 2 and 3 networks. Fully
disconnecting such networks is considered almost impossible without
having physical and administrative access to the network
itself. Pursuing other networks to de-peer a Tier 1 network is
impossible because of the many countries they are present in and their
jurisdictions.</t>

</section>
</section>
<section anchor="countering-de-peering"><name>Countering De-peering</name>

<t>Entities that want to protect themselves against de-peering would have
a diversified connectivity strategy including multiple Tier 1 and 2
peers, actively peering on Internet Exchange Points, and preferably
possessing its own physical infrastructure to connect to other networks
in different countries or regions.</t>

<t>Tier 3 networks are most vulnerable to de-peering.</t>

</section>
<section anchor="prefix-filtering"><name>Prefix Filtering</name>

<t>Each network that is part of the Internet uses unique IPv4 and IPv6
address prefixes ranges to expose services to its directly connected
(local) customers but also those connected via the Internet. These
prefixes are advertised over a BGP peering session to the neighboring
network so they will learn which prefixes originate from their
neighbor and know how to reach them. Subsequently, they will advertise
any routing knowledge they have about their neighboring networks and
the neighboring network of their neighbors, etc. This way every
network builds it own view of the Internet and map of how to reach
destinations.</t>

<t>For example, Tier 1 and 2 networks will both have ‘downstream’
(customer) peering sessions with networks of which they have knowledge
about; the prefixes they are advertising. If one of these networks
wants to filter a neighbor, they could de-peer them as discussed
earlier but that would basically filter all prefixes. In many cases,
for example when intending to filter out social media, a subset of the
prefixes is enough to accomplish this goal.</t>

<t>With this method a Tier 1 could also filter out prefixes from a Tier 3
that it learns via a Tier 2. De-peering the Tier 2 would result in all
Tier 2 and all its customer prefixes becoming unreachable via this
Tier 1. If only prefixes advertised by the single Tier 3 need to be
filtered, the Tier 1 applies a prefix filter to the peering session
from which it receives the advertisements.</t>

<t>Contrary, networks with many upstream connections to Tier 1 and 2
networks will have a much lower chance of being completely filtered as,
if one out of many upstream peers filters the prefixes, others might
still propagate them. This could still result in the prefix not being
globally reachable anymore, but the chances are much lower.</t>

</section>
</section>
<section anchor="packet-filtering"><name>Packet Filtering</name>

<t>Most network layer devices have the ability to filter traffic. The
mechanism for doing this is commonly called an "Access Control
List" (ACL). This is a possible mechanism for implementing a
disconnection. Typically, an ACL allows filtering on a combination of
source address, destination address, protocol number, and TCP/UDP
source or destination port number.</t>

<section anchor="geoip-acls"><name>GeoIP ACLs</name>

<t>The question then becomes one of ACL construction. However, this
is not simple. IP address space is delegated in large sets, commonly
known as 'prefixes.' Each prefix is assigned to an organization. Some
organizations, such as Internet Service Providers (ISPs) will in turn
delegate a portion of their address space to a customer. Customers and
service providers do not necessarily fall along clean regional
lines. Large multi-national corporations can receive a prefix from an
ISP in one region and may use it in an entirely different region or
even globally. They may also receive a prefix directly from a Regional
Internet Registry (RIR). Service providers can obtain a prefix from an
RIR and delegate parts of that prefix to customers from another
region. This can create both false positives and false negatives when
trying to map between a prefix and a region.</t>

<t>There are services which attempt to provide mappings from an IP
address or prefix to a region, commonly called 'GeoIP'
services. However, due to the above issues, these services
cannot guarantee their accuracy. Constructing an ACL based on GeoIP
services is likely to have unintended consequences, both filtering
unintended addresses and not filtering intended addresses. Some
commercial applications (notably streaming video) are willing to accept
these inaccuracies, but this may not be acceptable in all circumstances.</t>

<t>Virtual Private Networks (VPNs) and other tunneling mechanisms can
be used to create virtual topologies. If a single VPN server within
a target region is not blocked, then it can provide access to
innumerable other systems within the region, effectively bypassing
GeoIP filtering services. When these are discovered, they are
typically added to GeoIP databases, but this creates an ongoing battle
between VPN service providers and GeoIP providers. As a result, this
is an imperfect solution that may or may not be sufficiently accurate.</t>

</section>
</section>
<section anchor="dns"><name>DNS</name>

<t>Blocking DNS capabilities can be an effective method for inhibiting end
users from easily accessing Internet resources in a given region.  For
example, removing the delegation entries in the root servers for a given
country code can prevent users from resolving the names of all domains for
that country code.  This approach can be circumvented to an extent with
the creation of stub zones on resolving nameservers, which can provide a
shortcut delegation to the country code top-level domain servers (ccTLDs)
that are authoritative for that country code.  But these stub zone entries
would have to be manually created on any resolving nameserver that serves
the resolution requests of users seeking resolution of domains for that
particular country code.</t>

<t>In the opposite direction, blocking resolution requests can inhibit users
coming from a region from easily accessing Internet resources.
Specifically, filters can be used to block resolving nameservers from a
given region, or can block resolution requests from end users within
a given region from making resolution requests to resolving nameservers
that reside outside that region.</t>

</section>
</section>
<section anchor="gaps"><name>Gaps</name>

<t>The mechanisms discussed above cover the salient technical points for
blocking a region. In this section, we discuss the various other
considerations that are relevant to regional blocking.</t>

<section anchor="information-dissemination"><name>Information Dissemination</name>

<t>At the very lowest level, the Internet copies bits from one location
to another. Bits that are injected at one point are packetized,
forwarded, and hopefully show up at their intended destination. The
technology of the Internet does not care what is encoded in those
bits. Whether it is state secrets or yesterday's grocery list,
the Internet will happily ship it all the way around the world in
milliseconds. The intrinsic value, properties, and attributes of the
information conveyed in those bits is immaterial at the technological
level.</t>

<section anchor="information-value"><name>Information Value</name>

<t>Policies considering blocking the transfer of information must also
consider the value of the information that is being blocked. Filtering
mechanisms can be extremely coarse and block all information, and this
may not match the purposes of the policy. Thus, a blocking policy may
need to be extremely specific about its goals and purposes.</t>

<t>A policy may want some information to be able to enter into a
region. Sending certain messages into the region may be beneficial to
the policy maker. Similarly, being able to get information out of a
region may be beneficial. Further, parties within a region may be
depending on global Internet connectivity to coordinate activities.  A
policy that blocks too much information may be counterproductive to
the aims of the policy maker. A more selective policy would want some
information to be communicated and not other information. Further, a
selective policy is likely to be highly directional. Information that
should flow into the region may not be permitted back out, and vice
versa.</t>

</section>
</section>
<section anchor="information-concealment"><name>Information Concealment</name>

<t>If a policy allows any information to transit a boundary, then there
is the technological possibility that other information may also
transit that boundary. Information can be disguised or concealed
through the use of cryptography, steganography, or other
techniques. Policy makers should assume that any mechanism that allows
any information to transit a boundary would eventually be used to
transfer information against the purposes of the policy.</t>

</section>
<section anchor="misinformation"><name>Misinformation</name>

<t>If a policy blocks information from flowing into a region, that may
allow parties within that region to generate misinformation that is
not disputed by outside information. This may be highly advantageous
to the parties within the region. In the past, there have been many
occurrences when parties within a region disconnected from the
Internet precisely so that internal information could not be
disputed.</t>

</section>
<section anchor="target-inaccuracy"><name>Target Inaccuracy</name>

<t>The Internet infrastructure does not assign address space or ASNs
according to strict regional, national, or continental
boundaries. While there is some rough correlation, that is the result
of administrative convenience. Thus, a prefix that is allocated from
the general pool of European address space may end up covering part of
Europe and Greenland. An ASN that was allocated for Singapore may be
used in Australia.</t>

<t>This is further complicated by the fact that the parties that receive
an ASN or prefix are not obligated or constrained to use it in a given
region. If an organization acquires an ASN and subsequently grows
outside of its original region, it may still use that ASN. If a
company is assigned a prefix and the company is acquired by another
firm, then that prefix could be used in a completely different
hemisphere.</t>

<t>Consequently, if a policy elects to block traffic based on ASNs and
prefixes, it may have unintended consequences, potentially blocking
unintended traffic and not blocking proscribed traffic.</t>

<section anchor="accuracy-of-registry-information"><name>Accuracy of Registry Information</name>

<t>Many public resources are available to query Internet routing related
information including, IPv4, IPv6 and ASN resource holders, routing
intentions and actual reachability data. Unfortunately, the data
doesn’t always represent the actual situation, can be incomplete and
in quite a few occasions outdated.</t>

<section anchor="internet-routing-registries"><name>Internet Routing Registries</name>

<t>Internet Routing Registry (IRR) databases hold information about
network operators routing intentions. For example, ASN holders can
specify with whom they have peering relationships. This could give an
indication which networks a specific ASN is connected to, however the
data is entered (manually or automated) by network operators and isn’t
per se verified.</t>

<t>In practice IRR databases are between 40-70% accurate. However, some
show an accuracy of around 95%.</t>

</section>
<section anchor="rpki"><name>RPKI</name>

<t>Resource Public Key Infrastructure (RPKI) is a public key
infrastructure (PKI) framework to support improved security for the
Internet's BGP routing infrastructure. The most important property is
that in RPKI only legitimate resource holders can make statements
about the IPv4, IPv6 and ASN resources they hold. This means that any
information, right or wrong, found in RPKI databases represents the
intention of, or at least is entered into RPKI by, the rightful
holder.</t>

<t>RPKI is therefore considered to be 100% accurate. The downside of RPKI
is that there aren’t records for every resource and a large portion of
the IPv4, IPv6 and ASN resources don’t have records in RPKI.</t>

</section>
</section>
</section>
<section anchor="spoofing-asns-and-hijacking-prefixes"><name>Spoofing ASNs and Hijacking Prefixes</name>

<t>If a policy attempts to filter routing advertisements based on an ASN,
then the opposition may attempt to counter that filtering attempt by
using an alternate ASN. The alternate ASN may be an unused one, an ASN
that has been assigned but is not actively in use elsewhere, or could
be one that is actively assigned to another party. Using this ASN, the
opposition could advertise its prefixes into BGP, bypass the ASN
filter, and regain connectivity.</t>

<t>Similarly, if a policy attempts to filter routing advertisements or
implement forwarding plane filters based on assigned prefixes, then
the opposition may attempt to circumvent these policies by obtaining,
advertising, and deploying alternate prefixes. As with ASNs, these
prefixes could come from unassigned address space, address space that
has been assigned but is not actively advertised, or even address
space that is actively advertised by other parties.</t>

<t>There are security mechanisms that have been developed to help counter
these possible attacks (IRR filtering <xref target="RFC7682"/>, RPKI <xref target="RFC6811"/>,
and BGPsec <xref target="RFC8205"/>), but they are not ubiquitously deployed and
may or may not be effective, depending on the operational procedures
of ISPs that provide connectivity to the region.</t>

</section>
<section anchor="porous-borders"><name>Porous Borders</name>

<t>The Internet is, by design, a decentralized system of interconnections.
Thus, it is nearly impossible to completely block Internet access for a
region.  Simply put, there will always be ways to circumvent any blocking
attempts by sufficiently motivated parties.  However, there are certain
chokepoints and various methods, as described above, that can
significantly inhibit connectivity and throughput for users going
to/coming from a given region.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document was inspired by the thoughtful comments of many friends
and colleagues.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document makes no requests of IANA.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document discusses technical and policy considerations of
blocking Internet access for regions, and their potential impact on
global security.</t>

<t>This document does not present new attack or defense strategies and
merely discusses the implications of a variety of technical
approaches. This document does not advocate or dissuade any policy
about blocking Internet connectivity, it discusses various
considerations that policy makers should understand prior to setting
policy.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

&RFC4271;
&RFC7682;
&RFC6811;
&RFC8205;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

