asciidoctor-rfc 0.9.0 → 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.travis.yml +20 -8
- data/README.adoc +2 -2
- data/asciidoctor-rfc.gemspec +1 -1
- data/docs/installation.md +21 -0
- data/docs/navigation.md +10 -0
- data/docs/overview.md +5 -0
- data/lib/asciidoctor/rfc/common/base.rb +9 -0
- data/lib/asciidoctor/rfc/v2/base.rb +4 -2
- data/lib/asciidoctor/rfc/v3/base.rb +6 -1
- data/lib/asciidoctor/rfc/version.rb +1 -1
- data/lib/metanorma/rfc/processor_v2.rb +5 -1
- data/lib/metanorma/rfc/processor_v3.rb +5 -1
- data/spec/examples/davies-template-bare-06.xml.orig.txt +448 -0
- data/spec/examples/draft-iab-html-rfc-bis.xml.orig.txt +2298 -0
- data/spec/examples/draft-iab-rfc-framework-bis.xml.orig.txt +896 -0
- data/spec/examples/draft-ietf-core-block-xx.xml.orig.txt +1176 -0
- data/spec/examples/hoffmanv2.xml.orig.txt +280 -0
- data/spec/examples/mib-doc-template-xml-06.xml.orig.txt +672 -0
- data/spec/examples/rfc1149.md.2.xml.txt +168 -0
- data/spec/examples/rfc2100.md.2.xml.txt +168 -0
- data/spec/examples/rfc3514.md.2.xml.txt +336 -0
- data/spec/examples/rfc5841.md.2.xml.txt +504 -0
- data/spec/examples/rfc748.md.2.xml.txt +168 -0
- data/spec/examples/rfc7511.md.2.xml.txt +448 -0
- data/spec/examples/skel.xml.orig.txt +112 -0
- data/spec/examples/stupid-s.xml.orig.txt +784 -0
- metadata +21 -4
@@ -0,0 +1,168 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group D. Waitzman
|
6
|
+
Internet-Draft BBN STC
|
7
|
+
Intended status: Informational April 1, 1990
|
8
|
+
Expires: October 3, 1990
|
9
|
+
|
10
|
+
|
11
|
+
A Standard for the Transmission of IP Datagrams on Avian Carriers
|
12
|
+
rfc-1149
|
13
|
+
|
14
|
+
Status of This Memo
|
15
|
+
|
16
|
+
This Internet-Draft is submitted in full conformance with the
|
17
|
+
provisions of BCP 78 and BCP 79.
|
18
|
+
|
19
|
+
Internet-Drafts are working documents of the Internet Engineering
|
20
|
+
Task Force (IETF). Note that other groups may also distribute
|
21
|
+
working documents as Internet-Drafts. The list of current Internet-
|
22
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
23
|
+
|
24
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
25
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
26
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
27
|
+
material or to cite them other than as "work in progress."
|
28
|
+
|
29
|
+
This Internet-Draft will expire on October 3, 1990.
|
30
|
+
|
31
|
+
Copyright Notice
|
32
|
+
|
33
|
+
Copyright (c) 1990 IETF Trust and the persons identified as the
|
34
|
+
document authors. All rights reserved.
|
35
|
+
|
36
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
37
|
+
Provisions Relating to IETF Documents
|
38
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
39
|
+
publication of this document. Please review these documents
|
40
|
+
carefully, as they describe your rights and restrictions with respect
|
41
|
+
to this document. Code Components extracted from this document must
|
42
|
+
include Simplified BSD License text as described in Section 4.e of
|
43
|
+
the Trust Legal Provisions and are provided without warranty as
|
44
|
+
described in the Simplified BSD License.
|
45
|
+
|
46
|
+
|
47
|
+
|
48
|
+
|
49
|
+
|
50
|
+
|
51
|
+
|
52
|
+
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Waitzman Expires October 3, 1990 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft IP Datagrams on Avian Carriers April 1990
|
59
|
+
|
60
|
+
|
61
|
+
Table of Contents
|
62
|
+
|
63
|
+
1. Overview and Rational . . . . . . . . . . . . . . . . . . . . 2
|
64
|
+
2. Frame Format . . . . . . . . . . . . . . . . . . . . . . . . 2
|
65
|
+
3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
66
|
+
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
|
67
|
+
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 3
|
68
|
+
|
69
|
+
1. Overview and Rational
|
70
|
+
|
71
|
+
Avian carriers can provide high delay, low throughput, and low
|
72
|
+
altitude service. The connection topology is limited to a single
|
73
|
+
point-to-point path for each carrier, used with standard carriers,
|
74
|
+
but many carriers can be used without significant interference with
|
75
|
+
each other, outside of early spring. This is because of the 3D ether
|
76
|
+
space available to the carriers, in contrast to the 1D ether used by
|
77
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
78
|
+
system, which increases availability. Unlike some network
|
79
|
+
technologies, such as packet radio, communication is not limited to
|
80
|
+
line-of-sight distance. Connection oriented service is available in
|
81
|
+
some cities, usually based upon a central hub topology.
|
82
|
+
|
83
|
+
2. Frame Format
|
84
|
+
|
85
|
+
The IP datagram is printed, on a small scroll of paper, in
|
86
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
87
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
88
|
+
A band of duct tape is used to secure the datagram's edges. The
|
89
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
90
|
+
paradoxically, generally increases with increased carrier age. A
|
91
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
92
|
+
|
93
|
+
Upon receipt, the duct tape is removed and the paper copy of the
|
94
|
+
datagram is optically scanned into a electronically transmittable
|
95
|
+
form.
|
96
|
+
|
97
|
+
3. Discussion
|
98
|
+
|
99
|
+
Multiple types of service can be provided with a prioritized pecking
|
100
|
+
order. An additional property is built-in worm detection and
|
101
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
102
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
103
|
+
regenerating. While broadcasting is not specified, storms can cause
|
104
|
+
data loss. There is persistent delivery retry, until the carrier
|
105
|
+
drops. Audit trails are automatically generated, and can often be
|
106
|
+
found on logs and cable trays.
|
107
|
+
|
108
|
+
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Waitzman Expires October 3, 1990 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft IP Datagrams on Avian Carriers April 1990
|
115
|
+
|
116
|
+
|
117
|
+
4. Security Considerations
|
118
|
+
|
119
|
+
Security is not generally a problem in normal operation, but special
|
120
|
+
measures must be taken (such as data encryption) when avian carriers
|
121
|
+
are used in a tactical environment.
|
122
|
+
|
123
|
+
Author's Address
|
124
|
+
|
125
|
+
David Waitzman
|
126
|
+
BBN STC
|
127
|
+
10 Moulton Street
|
128
|
+
Cambridge MA 02238
|
129
|
+
|
130
|
+
Phone: (617) 873-4323
|
131
|
+
Email: dwaitzman@BBN.COM
|
132
|
+
|
133
|
+
|
134
|
+
|
135
|
+
|
136
|
+
|
137
|
+
|
138
|
+
|
139
|
+
|
140
|
+
|
141
|
+
|
142
|
+
|
143
|
+
|
144
|
+
|
145
|
+
|
146
|
+
|
147
|
+
|
148
|
+
|
149
|
+
|
150
|
+
|
151
|
+
|
152
|
+
|
153
|
+
|
154
|
+
|
155
|
+
|
156
|
+
|
157
|
+
|
158
|
+
|
159
|
+
|
160
|
+
|
161
|
+
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Waitzman Expires October 3, 1990 [Page 3]
|
@@ -0,0 +1,168 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group J. Ashworth
|
6
|
+
Internet-Draft Ashworth & Associates
|
7
|
+
Intended status: Informational April 1, 1997
|
8
|
+
Expires: October 3, 1997
|
9
|
+
|
10
|
+
|
11
|
+
The Naming of Hosts
|
12
|
+
rfc-2100
|
13
|
+
|
14
|
+
Status of This Memo
|
15
|
+
|
16
|
+
This Internet-Draft is submitted in full conformance with the
|
17
|
+
provisions of BCP 78 and BCP 79.
|
18
|
+
|
19
|
+
Internet-Drafts are working documents of the Internet Engineering
|
20
|
+
Task Force (IETF). Note that other groups may also distribute
|
21
|
+
working documents as Internet-Drafts. The list of current Internet-
|
22
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
23
|
+
|
24
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
25
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
26
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
27
|
+
material or to cite them other than as "work in progress."
|
28
|
+
|
29
|
+
This Internet-Draft will expire on October 3, 1997.
|
30
|
+
|
31
|
+
Copyright Notice
|
32
|
+
|
33
|
+
Copyright (c) 1997 IETF Trust and the persons identified as the
|
34
|
+
document authors. All rights reserved.
|
35
|
+
|
36
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
37
|
+
Provisions Relating to IETF Documents
|
38
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
39
|
+
publication of this document. Please review these documents
|
40
|
+
carefully, as they describe your rights and restrictions with respect
|
41
|
+
to this document. Code Components extracted from this document must
|
42
|
+
include Simplified BSD License text as described in Section 4.e of
|
43
|
+
the Trust Legal Provisions and are provided without warranty as
|
44
|
+
described in the Simplified BSD License.
|
45
|
+
|
46
|
+
1. Introduction
|
47
|
+
|
48
|
+
This RFC is a commentary on the difficulty of deciding upon an
|
49
|
+
acceptably distinctive hostname for one's computer, a problem which
|
50
|
+
grows in direct proportion to the logarithmically increasing size of
|
51
|
+
the Internet.
|
52
|
+
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Ashworth Expires October 3, 1997 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft The Naming of Hosts April 1997
|
59
|
+
|
60
|
+
|
61
|
+
Distribution of this memo is unlimited.
|
62
|
+
|
63
|
+
Except to TS Eliot.
|
64
|
+
|
65
|
+
And, for that matter, to David Addison, who hates iambic pentameter.
|
66
|
+
|
67
|
+
2. Poetry
|
68
|
+
|
69
|
+
The Naming of Hosts is a difficult matter,
|
70
|
+
It isn't just one of your holiday games;
|
71
|
+
You may think at first I'm as mad as a hatter
|
72
|
+
When I tell you, a host must have THREE DIFFERENT NAMES.
|
73
|
+
|
74
|
+
First of all, there's the name that the users use daily,
|
75
|
+
Such as venus, athena, and cisco, and ames,
|
76
|
+
Such as titan or sirius, hobbes or europa--
|
77
|
+
All of them sensible everyday names.
|
78
|
+
|
79
|
+
There are fancier names if you think they sound sweeter,
|
80
|
+
Some for the web pages, some for the flames:
|
81
|
+
Such as mercury, phoenix, orion, and charon--
|
82
|
+
But all of them sensible everyday names.
|
83
|
+
|
84
|
+
But I tell you, a host needs a name that's particular,
|
85
|
+
A name that's peculiar, and more dignified,
|
86
|
+
Else how can it keep its home page perpendicular,
|
87
|
+
And spread out its data, send pages world wide?
|
88
|
+
|
89
|
+
Of names of this kind, I can give you a quorum,
|
90
|
+
Like lothlorien, pothole, or kobyashi-maru,
|
91
|
+
Such as pearly-gates.vatican, or else diplomatic-
|
92
|
+
Names that never belong to more than one host.
|
93
|
+
|
94
|
+
But above and beyond there's still one name left over,
|
95
|
+
And that is the name that you never will guess;
|
96
|
+
The name that no human research can discover--
|
97
|
+
But THE NAMESERVER KNOWS, and will us'ually confess.
|
98
|
+
|
99
|
+
When you notice a client in rapt meditation,
|
100
|
+
The reason, I tell you, is always the same:
|
101
|
+
The code is engaged in a deep consultation
|
102
|
+
On the address, the address, the address of its name:
|
103
|
+
|
104
|
+
|
105
|
+
|
106
|
+
|
107
|
+
|
108
|
+
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Ashworth Expires October 3, 1997 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft The Naming of Hosts April 1997
|
115
|
+
|
116
|
+
|
117
|
+
It's ineffable,
|
118
|
+
effable,
|
119
|
+
Effanineffable,
|
120
|
+
Deep and inscrutable,
|
121
|
+
singular
|
122
|
+
Name.
|
123
|
+
|
124
|
+
3. Credits
|
125
|
+
|
126
|
+
Thanks to Don Libes, Mark Lottor, and a host of twisted
|
127
|
+
individuals^W^Wcreative sysadmins for providing source material for
|
128
|
+
this memo, to Andrew Lloyd-Webber, Cameron Mackintosh, and a cast of
|
129
|
+
thousands (particularly including Terrance Mann) who drew my
|
130
|
+
attention to the necessity, and of course, to Thomas Stearns Eliot,
|
131
|
+
for making this all necessary.
|
132
|
+
|
133
|
+
4. Security Considerations
|
134
|
+
|
135
|
+
Security issues are not discussed in this memo.
|
136
|
+
|
137
|
+
Particularly the cardiac security of certain famous poets.
|
138
|
+
|
139
|
+
5. Informative References
|
140
|
+
|
141
|
+
[1] Libes, D., "Choosing a Name for Your Computer",
|
142
|
+
Communications of the ACM Vol. 32, No. 11, Pg. 1289,
|
143
|
+
November 1989.
|
144
|
+
|
145
|
+
[2] Lottor, M., "Domain Name Survey", January 1997,
|
146
|
+
<namedroppers@internic.net>.
|
147
|
+
|
148
|
+
[3] Stearns, TS., "Old Possum's Book of Practical Cats".
|
149
|
+
|
150
|
+
[4] Wong, M., "Cool Hostnames",
|
151
|
+
<http://www.seas.upenn.edu/~mengwong/coolhosts.html>.
|
152
|
+
|
153
|
+
Author's Address
|
154
|
+
|
155
|
+
Jay R. Ashworth
|
156
|
+
Advanced Technology Consulting
|
157
|
+
St. Petersburg FL 33709-4819
|
158
|
+
|
159
|
+
Phone: +1 813 790 7592
|
160
|
+
Email: jra@scfn.thpl.lib.fl.us
|
161
|
+
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Ashworth Expires October 3, 1997 [Page 3]
|
@@ -0,0 +1,336 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group S. Bellovin
|
6
|
+
Internet-Draft AT&T Labs Research
|
7
|
+
Intended status: Informational April 1, 2003
|
8
|
+
Expires: October 3, 2003
|
9
|
+
|
10
|
+
|
11
|
+
The Security Flag in the IPv4 Header
|
12
|
+
rfc-3514
|
13
|
+
|
14
|
+
Abstract
|
15
|
+
|
16
|
+
Firewalls, packet filters, intrusion detection systems, and the like
|
17
|
+
often have difficulty distinguishing between packets that have
|
18
|
+
malicious intent and those that are merely unusual. We define a
|
19
|
+
security flag in the IPv4 header as a means of distinguishing the two
|
20
|
+
cases.
|
21
|
+
|
22
|
+
Status of This Memo
|
23
|
+
|
24
|
+
This Internet-Draft is submitted in full conformance with the
|
25
|
+
provisions of BCP 78 and BCP 79.
|
26
|
+
|
27
|
+
Internet-Drafts are working documents of the Internet Engineering
|
28
|
+
Task Force (IETF). Note that other groups may also distribute
|
29
|
+
working documents as Internet-Drafts. The list of current Internet-
|
30
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
31
|
+
|
32
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
33
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
34
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
35
|
+
material or to cite them other than as "work in progress."
|
36
|
+
|
37
|
+
This Internet-Draft will expire on October 3, 2003.
|
38
|
+
|
39
|
+
Copyright Notice
|
40
|
+
|
41
|
+
Copyright (c) 2003 IETF Trust and the persons identified as the
|
42
|
+
document authors. All rights reserved.
|
43
|
+
|
44
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
45
|
+
Provisions Relating to IETF Documents
|
46
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
47
|
+
publication of this document. Please review these documents
|
48
|
+
carefully, as they describe your rights and restrictions with respect
|
49
|
+
to this document. Code Components extracted from this document must
|
50
|
+
include Simplified BSD License text as described in Section 4.e of
|
51
|
+
the Trust Legal Provisions and are provided without warranty as
|
52
|
+
described in the Simplified BSD License.
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Bellovin Expires October 3, 2003 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
59
|
+
|
60
|
+
|
61
|
+
Table of Contents
|
62
|
+
|
63
|
+
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
64
|
+
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
|
65
|
+
2. Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
66
|
+
3. Setting the Evil Bit . . . . . . . . . . . . . . . . . . . . 3
|
67
|
+
4. Processing of the Evil Bit . . . . . . . . . . . . . . . . . 4
|
68
|
+
5. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 4
|
69
|
+
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
|
70
|
+
7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
|
71
|
+
8. Normative References . . . . . . . . . . . . . . . . . . . . 5
|
72
|
+
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6
|
73
|
+
|
74
|
+
1. Introduction
|
75
|
+
|
76
|
+
Firewalls [CBR03], packet filters, intrusion detection systems, and
|
77
|
+
the like often have difficulty distinguishing between packets that
|
78
|
+
have malicious intent and those that are merely unusual. The problem
|
79
|
+
is that making such determinations is hard. To solve this problem,
|
80
|
+
we define a security flag, known as the "evil" bit, in the IPv4
|
81
|
+
[RFC0791] header. Benign packets have this bit set to 0; those that
|
82
|
+
are used for an attack will have the bit set to 1.
|
83
|
+
|
84
|
+
1.1. Terminology
|
85
|
+
|
86
|
+
The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
|
87
|
+
SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
|
88
|
+
document, are to be interpreted as described in [RFC2119].
|
89
|
+
|
90
|
+
2. Syntax
|
91
|
+
|
92
|
+
The high-order bit of the IP fragment offset field is the only unused
|
93
|
+
bit in the IP header. Accordingly, the selection of the bit position
|
94
|
+
is not left to IANA.
|
95
|
+
|
96
|
+
The bit field is laid out as follows:
|
97
|
+
|
98
|
+
0
|
99
|
+
+-+
|
100
|
+
|E|
|
101
|
+
+-+
|
102
|
+
|
103
|
+
Currently-assigned values are defined as follows:
|
104
|
+
|
105
|
+
0x0:
|
106
|
+
If the bit is set to 0, the packet has no evil intent. Hosts,
|
107
|
+
network elements, etc., SHOULD assume that the packet is harmless,
|
108
|
+
and SHOULD NOT take any defensive measures. (We note that this
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Bellovin Expires October 3, 2003 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
115
|
+
|
116
|
+
|
117
|
+
part of the spec is already implemented by many common desktop
|
118
|
+
operating systems.)
|
119
|
+
|
120
|
+
0x1:
|
121
|
+
If the bit is set to 1, the packet has evil intent. Secure
|
122
|
+
systems SHOULD try to defend themselves against such packets.
|
123
|
+
Insecure systems MAY chose to crash, be penetrated, etc.
|
124
|
+
|
125
|
+
3. Setting the Evil Bit
|
126
|
+
|
127
|
+
There are a number of ways in which the evil bit may be set. Attack
|
128
|
+
applications may use a suitable API to request that it be set.
|
129
|
+
Systems that do not have other mechanisms MUST provide such an API;
|
130
|
+
attack programs MUST use it.
|
131
|
+
|
132
|
+
Multi-level insecure operating systems may have special levels for
|
133
|
+
attack programs; the evil bit MUST be set by default on packets
|
134
|
+
emanating from programs running at such levels. However, the system
|
135
|
+
_MAY_ provide an API to allow it to be cleared for non-malicious
|
136
|
+
activity by users who normally engage in attack behavior.
|
137
|
+
|
138
|
+
Fragments that by themselves are dangerous MUST have the evil bit
|
139
|
+
set. If a packet with the evil bit set is fragmented by an
|
140
|
+
intermediate router and the fragments themselves are not dangerous,
|
141
|
+
the evil bit MUST be cleared in the fragments, and MUST be turned
|
142
|
+
back on in the reassembled packet.
|
143
|
+
|
144
|
+
Intermediate systems are sometimes used to launder attack
|
145
|
+
connections. Packets to such systems that are intended to be relayed
|
146
|
+
to a target SHOULD have the evil bit set.
|
147
|
+
|
148
|
+
Some applications hand-craft their own packets. If these packets are
|
149
|
+
part of an attack, the application MUST set the evil bit by itself.
|
150
|
+
|
151
|
+
In networks protected by firewalls, it is axiomatic that all
|
152
|
+
attackers are on the outside of the firewall. Therefore, hosts
|
153
|
+
inside the firewall MUST NOT set the evil bit on any packets.
|
154
|
+
|
155
|
+
Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil
|
156
|
+
bit on such packets. "Transparent" http and email proxies SHOULD set
|
157
|
+
the evil bit on their reply packets to the innocent client host.
|
158
|
+
|
159
|
+
Some hosts scan other hosts in a fashion that can alert intrusion
|
160
|
+
detection systems. If the scanning is part of a benign research
|
161
|
+
project, the evil bit MUST NOT be set. If the scanning per se is
|
162
|
+
innocent, but the ultimate intent is evil and the destination site
|
163
|
+
has such an intrusion detection system, the evil bit SHOULD be set.
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Bellovin Expires October 3, 2003 [Page 3]
|
169
|
+
|
170
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
171
|
+
|
172
|
+
|
173
|
+
4. Processing of the Evil Bit
|
174
|
+
|
175
|
+
Devices such as firewalls MUST drop all inbound packets that have the
|
176
|
+
evil bit set. Packets with the evil bit off MUST NOT be dropped.
|
177
|
+
Dropped packets SHOULD be noted in the appropriate MIB variable.
|
178
|
+
|
179
|
+
Intrusion detection systems (IDSs) have a harder problem. Because of
|
180
|
+
their known propensity for false negatives and false positives, IDSs
|
181
|
+
MUST apply a probabilistic correction factor when evaluating the evil
|
182
|
+
bit. If the evil bit is set, a suitable random number generator
|
183
|
+
[RFC1750] must be consulted to determine if the attempt should be
|
184
|
+
logged. Similarly, if the bit is off, another random number
|
185
|
+
generator must be consulted to determine if it should be logged
|
186
|
+
despite the setting.
|
187
|
+
|
188
|
+
The default probabilities for these tests depends on the type of IDS.
|
189
|
+
Thus, a signature-based IDS would have a low false positive value but
|
190
|
+
a high false negative value. A suitable administrative interface
|
191
|
+
MUST be provided to permit operators to reset these values.
|
192
|
+
|
193
|
+
Routers that are not intended as as security devices SHOULD NOT
|
194
|
+
examine this bit. This will allow them to pass packets at higher
|
195
|
+
speeds.
|
196
|
+
|
197
|
+
As outlined earlier, host processing of evil packets is operating-
|
198
|
+
system dependent; however, all hosts MUST react appropriately
|
199
|
+
according to their nature.
|
200
|
+
|
201
|
+
5. Related Work
|
202
|
+
|
203
|
+
Although this document only defines the IPv4 evil bit, there are
|
204
|
+
complementary mechanisms for other forms of evil. We sketch some of
|
205
|
+
those here.
|
206
|
+
|
207
|
+
For IPv6 [RFC2460], evilness is conveyed by two options. The first,
|
208
|
+
a hop-by-hop option, is used for packets that damage the network,
|
209
|
+
such as DDoS packets. The second, an end-to-end option, is for
|
210
|
+
packets intended to damage destination hosts. In either case, the
|
211
|
+
option contains a 128-bit strength indicator, which says how evil the
|
212
|
+
packet is, and a 128-bit type code that describes the particular type
|
213
|
+
of attack intended.
|
214
|
+
|
215
|
+
Some link layers, notably those based on optical switching, may
|
216
|
+
bypass routers (and hence firewalls) entirely. Accordingly, some
|
217
|
+
link-layer scheme MUST be used to denote evil. This may involve evil
|
218
|
+
lambdas, evil polarizations, etc.
|
219
|
+
|
220
|
+
DDoS attack packets are denoted by a special diffserv code point.
|
221
|
+
|
222
|
+
|
223
|
+
|
224
|
+
Bellovin Expires October 3, 2003 [Page 4]
|
225
|
+
|
226
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
227
|
+
|
228
|
+
|
229
|
+
An application/evil MIME type is defined for Web- or email-carried
|
230
|
+
mischief. Other MIME types can be embedded inside of evil sections;
|
231
|
+
this permit easy encoding of word processing documents with macro
|
232
|
+
viruses, etc.
|
233
|
+
|
234
|
+
6. IANA Considerations
|
235
|
+
|
236
|
+
This document defines the behavior of security elements for the 0x0
|
237
|
+
and 0x1 values of this bit. Behavior for other values of the bit may
|
238
|
+
be defined only by IETF consensus [RFC2434].
|
239
|
+
|
240
|
+
7. Security Considerations
|
241
|
+
|
242
|
+
Correct functioning of security mechanisms depend critically on the
|
243
|
+
evil bit being set properly. If faulty components do not set the
|
244
|
+
evil bit to 1 when appropriate, firewalls will not be able to do
|
245
|
+
their jobs properly. Similarly, if the bit is set to 1 when it
|
246
|
+
shouldn't be, a denial of service condition may occur.
|
247
|
+
|
248
|
+
8. Normative References
|
249
|
+
|
250
|
+
[CBR03] Cheswick, W., Bellovin, S., and A. Rubin, "Firewalls and
|
251
|
+
Internet Security: Repelling the Wily Hacker, Second
|
252
|
+
Edition", Addison-Wesley , 2003.
|
253
|
+
|
254
|
+
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
|
255
|
+
DOI 10.17487/RFC0791, September 1981,
|
256
|
+
<https://www.rfc-editor.org/info/rfc791>.
|
257
|
+
|
258
|
+
[RFC1750] Eastlake 3rd, D., Crocker, S., and J. Schiller,
|
259
|
+
"Randomness Recommendations for Security", RFC 1750,
|
260
|
+
DOI 10.17487/RFC1750, December 1994,
|
261
|
+
<https://www.rfc-editor.org/info/rfc1750>.
|
262
|
+
|
263
|
+
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
264
|
+
Requirement Levels", BCP 14, RFC 2119,
|
265
|
+
DOI 10.17487/RFC2119, March 1997,
|
266
|
+
<https://www.rfc-editor.org/info/rfc2119>.
|
267
|
+
|
268
|
+
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
|
269
|
+
IANA Considerations Section in RFCs", RFC 2434,
|
270
|
+
DOI 10.17487/RFC2434, October 1998,
|
271
|
+
<https://www.rfc-editor.org/info/rfc2434>.
|
272
|
+
|
273
|
+
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
|
274
|
+
(IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
|
275
|
+
December 1998, <https://www.rfc-editor.org/info/rfc2460>.
|
276
|
+
|
277
|
+
|
278
|
+
|
279
|
+
|
280
|
+
Bellovin Expires October 3, 2003 [Page 5]
|
281
|
+
|
282
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
283
|
+
|
284
|
+
|
285
|
+
[RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
|
286
|
+
Address Translator (Traditional NAT)", RFC 3022,
|
287
|
+
DOI 10.17487/RFC3022, January 2001,
|
288
|
+
<https://www.rfc-editor.org/info/rfc3022>.
|
289
|
+
|
290
|
+
Author's Address
|
291
|
+
|
292
|
+
Steven M. Bellovin
|
293
|
+
AT&T Labs Research
|
294
|
+
180 Park Avenue
|
295
|
+
Florham Park NJ 07932
|
296
|
+
|
297
|
+
Phone: +1 973-360-8656
|
298
|
+
Email: bellovin@acm.org
|
299
|
+
|
300
|
+
|
301
|
+
|
302
|
+
|
303
|
+
|
304
|
+
|
305
|
+
|
306
|
+
|
307
|
+
|
308
|
+
|
309
|
+
|
310
|
+
|
311
|
+
|
312
|
+
|
313
|
+
|
314
|
+
|
315
|
+
|
316
|
+
|
317
|
+
|
318
|
+
|
319
|
+
|
320
|
+
|
321
|
+
|
322
|
+
|
323
|
+
|
324
|
+
|
325
|
+
|
326
|
+
|
327
|
+
|
328
|
+
|
329
|
+
|
330
|
+
|
331
|
+
|
332
|
+
|
333
|
+
|
334
|
+
|
335
|
+
|
336
|
+
Bellovin Expires October 3, 2003 [Page 6]
|