<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsec-probe-attribution-07" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="Probes Attribution">Attribution of Internet Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-probe-attribution-07"/>
    <author initials="E." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 6A</street>
          <city>Diegem</city>
          <code>1831</code>
          <country>Belgium</country>
        </postal>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="B." surname="Donnet" fullname="Benoît Donnet">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit.donnet@uliege.be</email>
      </address>
    </author>
    <author initials="J." surname="Iurman" fullname="Justin Iurman">
      <organization>Université de Liège</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>justin.iurman@uliege.be</email>
      </address>
    </author>
    <date year="2023" month="June" day="23"/>
    <area>Operations and Management</area>
    <workgroup>Operational Security Capabilities for IP Network Infrastructure</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Active measurements over the public Internet can target either collaborating parties or non-collaborating ones. Sometimes these measurements, also called probes, are viewed as unwelcome or aggressive.</t>
      <t>This document suggests some simple techniques for a source to identify its probes, allowing any party or organization to understand what an unsolicited probe packet is, what its purpose is, and more importantly who to contact. The technique relies on off-line analysis of the probe, therefore it does not require any change in the data or control plane. It has been designed mainly for layer-3 measurements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://evyncke.github.io/opsec-probe-attribution/draft-ietf-opsec-probe-attribution.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operational Security Capabilities for IP Network Infrastructure Working Group mailing list (<eref target="mailto:opsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/evyncke/opsec-probe-attribution"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many measurement researches (<xref target="LARGE_SCALE"/>, <xref target="RFC7872"/>, and <xref target="I-D.draft-vyncke-v6ops-james"/>) are about sending IP packets (sometimes with extension headers or layer-4 headers) over the public Internet and those packets can be destined to either collaborating parties or non-collaborating ones. Such packets are called probes in this document.</t>
      <t>Sending unsolicited probes should obviously be done at a rate low enough to not unduly impact the other parties' resources. But even at a low rate, those probes could trigger an alarm that will request some investigations by either the party receiving the probe (i.e., when the probe destination address is one address assigned to the receiving party) or by a third party having some devices through which those probes are transiting (e.g., an Internet transit router). The investigation will be done off-line by using packet captures, therefore the probe attribution does not require any change in the data or control planes.</t>
      <t>This document suggests some simple techniques for a source to identify its probes, allowing any party or organization to understand:</t>
      <ul spacing="normal">
        <li>what an unsolicited probe packet is,</li>
        <li>what its purpose is,</li>
        <li>and more importantly who to contact for further information.</li>
      </ul>
      <t>It is expected that only researchers with good intentions will use these techniques, although anyone might use them. This is discussed in <xref target="security"/>.</t>
      <t>While the technique could be used to mark measurements done at any layer of the protocol stack, it is mainly designed to work for measurements done at layer 3 (and its associated options or extension headers).</t>
    </section>
    <section anchor="probe-description">
      <name>Probe Description</name>
      <t>This section provides a way for a source to describe (i.e., to identify) its probes.</t>
      <section anchor="uri">
        <name>Probe Description URI</name>
        <t>This document defines a Probe Description URI as a URI pointing to either:</t>
        <ul spacing="normal">
          <li>a Probe Description File (see <xref target="file"/>) as defined in <xref target="iana"/>, e.g., "https://example.net/.well-known/probing.txt";</li>
          <li>an email address, e.g., "mailto:lab@example.net";</li>
          <li>a phone number, e.g., "tel:+1-201-555-0123".</li>
        </ul>
      </section>
      <section anchor="file">
        <name>Probe Description File</name>
        <t>As defined in <xref target="iana"/>, the Probe Description File must be made available at "/.well-known/probing.txt". The Probe Description File must follow the format defined in section 4 of <xref target="RFC9116"/> and should contain the following fields defined in section 2 of <xref target="RFC9116"/>:</t>
        <ul spacing="normal">
          <li>Canonical</li>
          <li>Contact</li>
          <li>Expires</li>
          <li>Preferred-Languages</li>
        </ul>
        <t>A new field "Description" should also be included to describe the measurement. To match the format defined in section 4 of <xref target="RFC9116"/>, this field must be a one-line string.</t>
        <section anchor="example">
          <name>Example</name>
          <artwork><![CDATA[
    # Canonical URI (if any)
    Canonical: https://example.net/measurement.txt

    # Contact address
    Contact: mailto:lab@example.net

    # Validity
    Expires: 2023-12-31T18:37:07z

    # Languages
    Preferred-Languages: en, es, fr

    # Probes description
    Description: This is a one-line string description of the
    probes, with no line break.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="out-of-band-probe-attribution">
      <name>Out-of-band Probe Attribution</name>
      <t>A possibility for probe attribution is to build a specific URI based on the source address of the probe packet, following <xref target="RFC8615"/>. For example, with a probe source address 2001:db8:dead::1, the following URI is built:</t>
      <ul spacing="normal">
        <li>if the reverse DNS record for 2001:db8:dead::1 exists, e.g., "example.net", then the Probe Description URI is "https://example.net/.well-known/probing.txt";</li>
        <li>else (or in addition), the Probe Description URI is "https://[2001:db8:dead::1]/.well-known/probing.txt". If there is no certificate associated to this address (e.g., via <xref target="RFC8738"/>), then there will be a certificate verification issue.</li>
      </ul>
      <t>The built URI must be a reference to the Probe Description File (see <xref target="file"/>).</t>
      <t>As an example, the UK National Cyber Security Centre <xref target="NCSC"/> uses a similar attribution. They scan for vulnerabilities across internet-connected systems in the UK and publish information on their scanning (<xref target="NCSC_SCAN_INFO"/>), providing the address of the webpage in reverse DNS.</t>
    </section>
    <section anchor="in-band-probe-attribution">
      <name>In-band Probe Attribution</name>
      <t>Another possibility for probe attribution is to include a Probe Description URI in the probe itself:</t>
      <ul spacing="normal">
        <li>For an ICMPv6 echo request <xref target="RFC4443"/>, include it in the data field;</li>
        <li>For an ICMPv4 echo request <xref target="RFC792"/>, include it in the data field;</li>
        <li>For a UDP datagram <xref target="RFC768"/>, include it in the data payload if its content has no structure;</li>
        <li>For a TCP segment <xref target="RFC9293"/>, include it in the data payload if its content has no structure;</li>
        <li>For an IPv6 packet <xref target="RFC8200"/>, include it in a PadN option either inside a Hop-by-Hop or Destination Options header.</li>
      </ul>
      <t>The Probe Description URI must start at the first octet of the payload and must be terminated by an octet of 0x00, i.e., it must be null terminated. If the Probe Description URI cannot be placed at the beginning of the payload, then it must be preceded by an octet of 0x00. Inserting the Probe Description URI could obviously bias the measurement itself if the probe packet becomes larger than the path MTU. Some examples are given in the appendix <xref target="examples"/>.</t>
      <t>Note: using a magic string (i.e., a unique special opaque marker) to signal the presence of the Probe Description URI is not recommended as some transit nodes could apply a different processing for packets containing this magic string.</t>
      <t>For the record, the in-band probe attribution was used in <xref target="I-D.draft-vyncke-v6ops-james"/>.</t>
    </section>
    <section anchor="operational-and-technical-considerations">
      <name>Operational and Technical Considerations</name>
      <t>Using either the out-of-band or in-band technique, or even both combined, highly depends on intent or context. This section describes the upsides and downsides of each technique, so that probe owners or probe makers can freely decide what works best for their cases.</t>
      <t>The advantages of using the out-of-band technique are that the probing measurement is not impacted by the probe attribution but also that it is easy to set up, i.e., by running a web server on a probe device to describe the measurements. Unfortunately, there are some disadvantages too. In some cases, using the out-of-band technique might not be possible due to several conditions: the presence of a NAT, too many endpoints to run a web server on, the probe source IP address cannot be known (e.g., RIPE Atlas <xref target="RIPE_ATLAS"/> probes are sent from IP addresses not owned by the probe owner), dynamic source addresses, etc.</t>
      <t>The primary advantage of using the in-band technique is that it covers the cases where the out-of-band technique is not feasible (as described above). The primary disadvantage is that it could potentially bias the measurements, since packets with the Probe Description URI might be discarded. For example, data is allowed in TCP segments with the SYN flag (<xref target="RFC9293"/>) but may change the way they are processed, i.e., TCP segments with the SYN flag containing the Probe Description URI might be discarded. Another example is the Probe Description URI included in a Hop-by-Hop or Destination Options header, inside a PadN option. As per the informational <xref target="RFC4942"/>, section 2.1.9.5, it is suggested that a PadN option should only contain 0's and be smaller than 8 octets, thus limiting its use for probe attribution. If a PadN option does not respect the recommendation, it is suggested that one may consider dropping such packets. For example, the Linux Kernel follows these recommendations and discards such packets since its version 3.5;</t>
      <t>Having both the out-of-band and in-band techniques combined also has a big advantage, i.e., it could be used as an indirect means of "authenticating" the Probe Description URI in the in-band probe, thanks to a correlation with the out-of-band technique (e.g., a reverse DNS lookup). While the out-of-band technique alone is less prone to spoofing, the combination with the in-band technique offers a more complete solution.</t>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>Executing measurement experiences over the global Internet obviously requires ethical consideration, especially when unsolicited transit/destination parties are involved.</t>
      <t>This document proposes a common way to identify the source and the purpose of active probing in order to reduce the potential burden on the unsolicited parties.</t>
      <t>But there are other considerations to be taken into account: from the payload content (e.g., is the encoding valid?) to the transmission rate (see also <xref target="IPV6_TOPOLOGY"/> and <xref target="IPV4_TOPOLOGY"/> for some probing speed impacts). Those considerations are out of scope of this document.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>It is expected that only researchers with good intentions will use these techniques, which will simplify and reduce the time to identify probes across the Internet.</t>
      <t>This information is provided to identify the source and intent of specific probes, but there is no authentication possible for the inline information.  Therefore, a malevolent actor could provide false information while conducting the probes, so that the action is attributed to a third party. In that case, not only would this third party be wrongly accused, but it might also be exposed to unwanted solicitations (e.g., angry emails or phone calls, if the malevolent actor used someone else's email address or phone number). As a consequence, the recipient of this information cannot trust it without confirmation.  If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no probe attribution.</t>
      <t>As the Probe Description URI is transmitted in the clear and as the Probe Description File is publicly readable, Personally Identifiable Information (PII) should not be used for email address and phone number; a generic / group email address and phone number should be preferred.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>The "Well-Known URIs" registry should be updated with the following additional values (using the template from <xref target="RFC8615"/>):</t>
      <ul spacing="normal">
        <li>URI suffix: probing.txt</li>
        <li>Change controller: IETF</li>
        <li>Specification document(s): this document</li>
        <li>Status: permanent</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil">
              <organization/>
            </author>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta">
              <organization/>
            </author>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC768">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP).  TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet.  Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion.  This document collects and brings those changes together with the protocol specification from RFC 793.  This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements.  It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state.  The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="LARGE_SCALE" target="https://dl.acm.org/doi/pdf/10.1145/1071690.1064256">
          <front>
            <title>Efficient Algorithms for Large-Scale Topology Discovery</title>
            <author initials="B." surname="Donnet" fullname="Benoît Donnet">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="P." surname="Raoult" fullname="Philippe Raoult">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="T." surname="Friedman" fullname="Timur Friedman">
              <organization>Université Pierre &amp; Marie Curie Laboratoire LiP6–CNRS</organization>
            </author>
            <author initials="M." surname="Crovella" fullname="Mark Crovella">
              <organization>Boston University Computer Science Department</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/1071690.1064256"/>
        </reference>
        <reference anchor="IPV6_TOPOLOGY" target="http://www.cmand.org/papers/beholder-imc18.pdf">
          <front>
            <title>In the IP of the Beholder Strategies for Active IPv6 Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author initials="R." surname="Durairajan" fullname="Ramakrishnan Durairajan">
              <organization>University of Oregon</organization>
            </author>
            <author initials="D." surname="Plonka" fullname="David Plonka">
              <organization>Akamai Technologies</organization>
            </author>
            <author initials="J.P." surname="Rohrer" fullname="Justin P. Rohrer">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/3278532.3278559"/>
        </reference>
        <reference anchor="IPV4_TOPOLOGY" target="http://www.cmand.org/papers/yarrp-imc16.pdf">
          <front>
            <title>Yarrp’ing the Internet Randomized High-Speed Active Topology Discovery</title>
            <author initials="R." surname="Beverly" fullname="Robert Beverly">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/2987443.2987479"/>
        </reference>
        <reference anchor="RIPE_ATLAS" target="https://atlas.ripe.net/">
          <front>
            <title>RIPE Atlas</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC" target="https://www.ncsc.gov.uk/">
          <front>
            <title>The National Cyber Security Centre</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NCSC_SCAN_INFO" target="https://www.ncsc.gov.uk/information/ncsc-scanning-information">
          <front>
            <title>NCSC Scanning information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SCAPY" target="https://scapy.net/">
          <front>
            <title>Scapy</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont">
              <organization/>
            </author>
            <author fullname="J. Linkova" initials="J." surname="Linkova">
              <organization/>
            </author>
            <author fullname="T. Chown" initials="T." surname="Chown">
              <organization/>
            </author>
            <author fullname="W. Liu" initials="W." surname="Liu">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="I-D.draft-vyncke-v6ops-james">
          <front>
            <title>Just Another Measurement of Extension header Survivability (JAMES)</title>
            <author fullname="Éric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Raphaël Léas" initials="R." surname="Léas">
              <organization>Université de Liège</organization>
            </author>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>Université de Liège</organization>
            </author>
            <date day="9" month="January" year="2023"/>
            <abstract>
              <t>   In 2016, RFC7872 has measured the drop of packets with IPv6 extension
   headers.  This document presents a slightly different methodology
   with more recent results.  It is still work in progress.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-03"/>
        </reference>
        <reference anchor="RFC8738">
          <front>
            <title>Automated Certificate Management Environment (ACME) IP Identifier Validation Extension</title>
            <author fullname="R.B. Shoemaker" initials="R.B." surname="Shoemaker">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies identifiers and challenges required to enable the Automated Certificate Management Environment (ACME) to issue certificates for IP addresses.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8738"/>
          <seriesInfo name="DOI" value="10.17487/RFC8738"/>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Alain Fiocco, Fernando Gont, Ted Hardie, Mehdi Kouhen, and Mark Townsley for helpful discussions as well as Raphael Leas for an early implementation.</t>
      <t>The authors would also like to gracefully acknowledge useful reviews and comments received from Warren Kumari, Jen Linkova, Mark Nottingham, Prapanch Ramamoorthy, Tirumal Reddy, Andrew Shaw, and Magnus Westerlund.</t>
    </section>
    <section anchor="examples">
      <name>Appendix Examples of in-band Attribution</name>
      <t>Here are several examples generated by <xref target="SCAPY"/> and displayed in the 'tcpdump' format:</t>
      <ul spacing="normal">
        <li>IP packet with Probe Description URI inside a Destination Options extension header</li>
        <li>IP packet with the URI in the data payload of a TCP SYN</li>
        <li>IP echo request with another URI in the data part of the ICMP ECHO_REQUEST</li>
        <li>IPv4 echo request with a URI in the data part if the ICMP ECHO_REQUEST</li>
      </ul>
      <artwork><![CDATA[
IP6 2001:db8:dead::1 > 2001:db8:beef::1: DSTOPT 60878 > traceroute: Flags [S], seq 0, win 8192, length 0
        0x0000:  6000 0000 0044 3c40 2001 0db8 dead 0000  `....D<@........
        0x0010:  0000 0000 0000 0001 2001 0db8 beef 0000  ................
        0x0020:  0000 0000 0000 0001 0605 012c 6874 7470  ...........,http
        0x0030:  733a 2f2f 6578 616d 706c 652e 6e65 742f  s://example.net/
        0x0040:  2e77 656c 6c2d 6b6e 6f77 6e2f 7072 6f62  .well-known/prob
        0x0050:  696e 672e 7478 7400 edce 829a 0000 0000  ing.txt.........
        0x0060:  0000 0000 5002 2000 2668 0000            ....P...&h..

IP6 2001:db8:dead::1.15581 > 2001:db8:beef::1.traceroute: Flags [S], seq 0:23, win 8192, length 23
        0x0000:  6000 0000 002b 0640 2001 0db8 dead 0000  `....+.@........
        0x0010:  0000 0000 0000 0001 2001 0db8 beef 0000  ................
        0x0020:  0000 0000 0000 0001 3cdd 829a 0000 0000  ........<.......
        0x0030:  0000 0000 5002 2000 c9b7 0000 6d61 696c  ....P.......mail
        0x0040:  746f 3a6c 6162 4065 7861 6d70 6c65 2e6e  to:lab@example.n
        0x0050:  6574 00                                  et.

IP6 2001:db8:dead::1 > 2001:db8:beef::1: ICMP6, echo reply, id 0, seq 0, length 28
        0x0000:  6000 0000 001c 3a40 2001 0db8 dead 0000  `.....:@........
        0x0010:  0000 0000 0000 0001 2001 0db8 beef 0000  ................
        0x0020:  0000 0000 0000 0001 8100 2896 0000 0000  ..........(.....
        0x0030:  7465 6c3a 2b31 2d32 3031 2d35 3535 2d30  tel:+1-201-555-0
        0x0040:  3132 3300                                123.

IP 192.0.2.1 > 198.51.100.1: ICMP echo request, id 0, seq 0, length 31
        0x0000:  4500 0033 0001 0000 4001 8e93 c000 0201  E..3....@.......
        0x0010:  c633 6401 0800 ea74 0000 0000 6d61 696c  .3d....t....mail
        0x0020:  746f 3a6c 6162 4065 7861 6d70 6c65 2e6e  to:lab@example.n
        0x0030:  6574 00                                  et.
]]></artwork>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
