<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.7.0) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-01"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 64</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="March" day="05"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Sometimes these measurements are viewed as unwelcome or aggressive. This document proposes some simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. Such measurements include <xref target="LARGE_SCALE"/> and <xref target="RFC7872"/>.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties resources. But even at a low rate, those probes could trigger an alarm that will request some investigation by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices where those probes are transiting (e.g., an Internet transit router).</t>
      <t>This document suggests some simple techniques allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what this unsolicited packet is,</li>
        <li>what is its purpose,</li>
        <li>and more significantly who to contact for further information or to stop the probing.</li>
      </ul>
      <t>Note: it is expected that only researchers with no bad intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a probe description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a probe description file (see <xref target="file"/>) as defined in <xref target="iana"/>: "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:user@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the probe description file must be made available at "https://example.net/.well-known/probing.txt". The probe description file must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:user@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probe/Measurement description
    Description: This is a description of the measurement. The in-band probe attribution was used by [I-D.draft-vyncke-v6ops-james].
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>An alternative to URI inclusion is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8::dead, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8::dead exists, e.g., "example.net", then the probe description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the probe description URI is "https://[2001:db8::dead]/.well-known/probing.txt". In this case, there might be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the probe description file (see <xref target="file"/>).</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>When the measurement allows for it, a probe description URI should be included in the payload of all probes sent. This could be:</t>
      <ul spacing="normal">
        <li>for a <xref target="RFC4443"/> ICMPv6 echo request: in the optional data (see section 4.1 of <xref target="RFC4443"/>);</li>
        <li>for a <xref target="RFC792"/> ICMPv4 echo request: in the optional data;</li>
        <li>for a <xref target="RFC768"/> UDP datagram: in the data part;</li>
        <li>for a <xref target="RFC793"/> TCP packet with the SYN flag: data is allowed in TCP packets with the SYN flag per section 3.4 of <xref target="RFC793"/> (2nd paragraph). However, it may change the way the packet is processed;</li>
        <li>for a <xref target="RFC8200"/> IPv6 packet with either hop-by-hop or destination options headers, in a PadN option. However, the PadN option is not recommended: as per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that PadN options should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. Indeed, inserting the probe description URI in PadN options could bias the measurement itself. For example, the Linux Kernel follows these recommendations since its version 3.5;</li>
        <li>etc.</li>
      </ul>
      <t>The probe description URI should start at the first octet of the payload and should be terminated by an octet of 0x00, i.e., it must be null terminated. If the probe description URI cannot be placed at the beginning of the payload, then it should be preceded by an octet of 0x00.</t>
      <t>Note: the above techniques produce a valid and legitimate packet for all the nodes forwarding the probe, except maybe for a hop-by-hop options header with a PadN option containing the probe description URI. As for the receiver, it may or may not process the packet, depending on where the probe description URI is included (e.g., TCP SYN flag with the probe description URI included in data, destination options header with a PadN option containing the probe description URI). As a consequence, a response may not be received. The choice of the probe description URI location is important and highly depends on the context, which is why multiple possibilities are proposed in this document.</t>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on will or context. The authors recommend the following classification of priorities:</t>
      <ol spacing="normal" type="1">
        <li>Both out-of-band and in-band</li>
        <li>Out-of-band only</li>
        <li>In-band only</li>
        <li>None</li>
      </ol>
      <t>Both out-of-band and in-band combined should be preferred. It could be used as an indirect means of "authenticating" the probe description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). However, the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on (e.g., RIPE Atlas probes), dynamic source addresses, etc. In that case, the in-band solution should be preferred.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing some measurement experiences over the global Internet obviously require some ethical considerations when transit/destination non-solicited parties are involved.</t>
      <t>This document proposes a common way to identity the source and the purpose of active probing in order to reduce the potential burden on the non-solicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid ?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>While it is expected that only researchers with no bad intentions will use these techniques, they will simplify and shorten the time to identify a probing across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  As a result, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party.  As a consequence, the recipient of this information cannot trust this information without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no attribution.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <seriesInfo name="DOI" value="10.17487/RFC9116"/>
            <seriesInfo name="RFC" value="9116"/>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8615"/>
            <seriesInfo name="RFC" value="8615"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC4443"/>
            <seriesInfo name="RFC" value="4443"/>
            <seriesInfo name="STD" value="89"/>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0792"/>
            <seriesInfo name="RFC" value="792"/>
            <seriesInfo name="STD" value="5"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0768"/>
            <seriesInfo name="RFC" value="768"/>
            <seriesInfo name="STD" value="6"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
        </reference>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC0793"/>
            <seriesInfo name="RFC" value="793"/>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8200"/>
            <seriesInfo name="RFC" value="8200"/>
            <seriesInfo name="STD" value="86"/>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J. P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp'ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <seriesInfo name="DOI" value="10.17487/RFC7872"/>
            <seriesInfo name="RFC" value="7872"/>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC4942"/>
            <seriesInfo name="RFC" value="4942"/>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful review and comments received from Jen Linkova, Prapanch Ramamoorthy, and Warren Kumari.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
