asciidoctor-rfc 0.9.0 → 0.9.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.travis.yml +20 -8
- data/README.adoc +2 -2
- data/asciidoctor-rfc.gemspec +1 -1
- data/docs/installation.md +21 -0
- data/docs/navigation.md +10 -0
- data/docs/overview.md +5 -0
- data/lib/asciidoctor/rfc/common/base.rb +9 -0
- data/lib/asciidoctor/rfc/v2/base.rb +4 -2
- data/lib/asciidoctor/rfc/v3/base.rb +6 -1
- data/lib/asciidoctor/rfc/version.rb +1 -1
- data/lib/metanorma/rfc/processor_v2.rb +5 -1
- data/lib/metanorma/rfc/processor_v3.rb +5 -1
- data/spec/examples/davies-template-bare-06.xml.orig.txt +448 -0
- data/spec/examples/draft-iab-html-rfc-bis.xml.orig.txt +2298 -0
- data/spec/examples/draft-iab-rfc-framework-bis.xml.orig.txt +896 -0
- data/spec/examples/draft-ietf-core-block-xx.xml.orig.txt +1176 -0
- data/spec/examples/hoffmanv2.xml.orig.txt +280 -0
- data/spec/examples/mib-doc-template-xml-06.xml.orig.txt +672 -0
- data/spec/examples/rfc1149.md.2.xml.txt +168 -0
- data/spec/examples/rfc2100.md.2.xml.txt +168 -0
- data/spec/examples/rfc3514.md.2.xml.txt +336 -0
- data/spec/examples/rfc5841.md.2.xml.txt +504 -0
- data/spec/examples/rfc748.md.2.xml.txt +168 -0
- data/spec/examples/rfc7511.md.2.xml.txt +448 -0
- data/spec/examples/skel.xml.orig.txt +112 -0
- data/spec/examples/stupid-s.xml.orig.txt +784 -0
- metadata +21 -4
@@ -0,0 +1,168 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group D. Waitzman
|
6
|
+
Internet-Draft BBN STC
|
7
|
+
Intended status: Informational April 1, 1990
|
8
|
+
Expires: October 3, 1990
|
9
|
+
|
10
|
+
|
11
|
+
A Standard for the Transmission of IP Datagrams on Avian Carriers
|
12
|
+
rfc-1149
|
13
|
+
|
14
|
+
Status of This Memo
|
15
|
+
|
16
|
+
This Internet-Draft is submitted in full conformance with the
|
17
|
+
provisions of BCP 78 and BCP 79.
|
18
|
+
|
19
|
+
Internet-Drafts are working documents of the Internet Engineering
|
20
|
+
Task Force (IETF). Note that other groups may also distribute
|
21
|
+
working documents as Internet-Drafts. The list of current Internet-
|
22
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
23
|
+
|
24
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
25
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
26
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
27
|
+
material or to cite them other than as "work in progress."
|
28
|
+
|
29
|
+
This Internet-Draft will expire on October 3, 1990.
|
30
|
+
|
31
|
+
Copyright Notice
|
32
|
+
|
33
|
+
Copyright (c) 1990 IETF Trust and the persons identified as the
|
34
|
+
document authors. All rights reserved.
|
35
|
+
|
36
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
37
|
+
Provisions Relating to IETF Documents
|
38
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
39
|
+
publication of this document. Please review these documents
|
40
|
+
carefully, as they describe your rights and restrictions with respect
|
41
|
+
to this document. Code Components extracted from this document must
|
42
|
+
include Simplified BSD License text as described in Section 4.e of
|
43
|
+
the Trust Legal Provisions and are provided without warranty as
|
44
|
+
described in the Simplified BSD License.
|
45
|
+
|
46
|
+
|
47
|
+
|
48
|
+
|
49
|
+
|
50
|
+
|
51
|
+
|
52
|
+
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Waitzman Expires October 3, 1990 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft IP Datagrams on Avian Carriers April 1990
|
59
|
+
|
60
|
+
|
61
|
+
Table of Contents
|
62
|
+
|
63
|
+
1. Overview and Rational . . . . . . . . . . . . . . . . . . . . 2
|
64
|
+
2. Frame Format . . . . . . . . . . . . . . . . . . . . . . . . 2
|
65
|
+
3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
66
|
+
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
|
67
|
+
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 3
|
68
|
+
|
69
|
+
1. Overview and Rational
|
70
|
+
|
71
|
+
Avian carriers can provide high delay, low throughput, and low
|
72
|
+
altitude service. The connection topology is limited to a single
|
73
|
+
point-to-point path for each carrier, used with standard carriers,
|
74
|
+
but many carriers can be used without significant interference with
|
75
|
+
each other, outside of early spring. This is because of the 3D ether
|
76
|
+
space available to the carriers, in contrast to the 1D ether used by
|
77
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
78
|
+
system, which increases availability. Unlike some network
|
79
|
+
technologies, such as packet radio, communication is not limited to
|
80
|
+
line-of-sight distance. Connection oriented service is available in
|
81
|
+
some cities, usually based upon a central hub topology.
|
82
|
+
|
83
|
+
2. Frame Format
|
84
|
+
|
85
|
+
The IP datagram is printed, on a small scroll of paper, in
|
86
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
87
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
88
|
+
A band of duct tape is used to secure the datagram's edges. The
|
89
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
90
|
+
paradoxically, generally increases with increased carrier age. A
|
91
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
92
|
+
|
93
|
+
Upon receipt, the duct tape is removed and the paper copy of the
|
94
|
+
datagram is optically scanned into a electronically transmittable
|
95
|
+
form.
|
96
|
+
|
97
|
+
3. Discussion
|
98
|
+
|
99
|
+
Multiple types of service can be provided with a prioritized pecking
|
100
|
+
order. An additional property is built-in worm detection and
|
101
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
102
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
103
|
+
regenerating. While broadcasting is not specified, storms can cause
|
104
|
+
data loss. There is persistent delivery retry, until the carrier
|
105
|
+
drops. Audit trails are automatically generated, and can often be
|
106
|
+
found on logs and cable trays.
|
107
|
+
|
108
|
+
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Waitzman Expires October 3, 1990 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft IP Datagrams on Avian Carriers April 1990
|
115
|
+
|
116
|
+
|
117
|
+
4. Security Considerations
|
118
|
+
|
119
|
+
Security is not generally a problem in normal operation, but special
|
120
|
+
measures must be taken (such as data encryption) when avian carriers
|
121
|
+
are used in a tactical environment.
|
122
|
+
|
123
|
+
Author's Address
|
124
|
+
|
125
|
+
David Waitzman
|
126
|
+
BBN STC
|
127
|
+
10 Moulton Street
|
128
|
+
Cambridge MA 02238
|
129
|
+
|
130
|
+
Phone: (617) 873-4323
|
131
|
+
Email: dwaitzman@BBN.COM
|
132
|
+
|
133
|
+
|
134
|
+
|
135
|
+
|
136
|
+
|
137
|
+
|
138
|
+
|
139
|
+
|
140
|
+
|
141
|
+
|
142
|
+
|
143
|
+
|
144
|
+
|
145
|
+
|
146
|
+
|
147
|
+
|
148
|
+
|
149
|
+
|
150
|
+
|
151
|
+
|
152
|
+
|
153
|
+
|
154
|
+
|
155
|
+
|
156
|
+
|
157
|
+
|
158
|
+
|
159
|
+
|
160
|
+
|
161
|
+
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Waitzman Expires October 3, 1990 [Page 3]
|
@@ -0,0 +1,168 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group J. Ashworth
|
6
|
+
Internet-Draft Ashworth & Associates
|
7
|
+
Intended status: Informational April 1, 1997
|
8
|
+
Expires: October 3, 1997
|
9
|
+
|
10
|
+
|
11
|
+
The Naming of Hosts
|
12
|
+
rfc-2100
|
13
|
+
|
14
|
+
Status of This Memo
|
15
|
+
|
16
|
+
This Internet-Draft is submitted in full conformance with the
|
17
|
+
provisions of BCP 78 and BCP 79.
|
18
|
+
|
19
|
+
Internet-Drafts are working documents of the Internet Engineering
|
20
|
+
Task Force (IETF). Note that other groups may also distribute
|
21
|
+
working documents as Internet-Drafts. The list of current Internet-
|
22
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
23
|
+
|
24
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
25
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
26
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
27
|
+
material or to cite them other than as "work in progress."
|
28
|
+
|
29
|
+
This Internet-Draft will expire on October 3, 1997.
|
30
|
+
|
31
|
+
Copyright Notice
|
32
|
+
|
33
|
+
Copyright (c) 1997 IETF Trust and the persons identified as the
|
34
|
+
document authors. All rights reserved.
|
35
|
+
|
36
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
37
|
+
Provisions Relating to IETF Documents
|
38
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
39
|
+
publication of this document. Please review these documents
|
40
|
+
carefully, as they describe your rights and restrictions with respect
|
41
|
+
to this document. Code Components extracted from this document must
|
42
|
+
include Simplified BSD License text as described in Section 4.e of
|
43
|
+
the Trust Legal Provisions and are provided without warranty as
|
44
|
+
described in the Simplified BSD License.
|
45
|
+
|
46
|
+
1. Introduction
|
47
|
+
|
48
|
+
This RFC is a commentary on the difficulty of deciding upon an
|
49
|
+
acceptably distinctive hostname for one's computer, a problem which
|
50
|
+
grows in direct proportion to the logarithmically increasing size of
|
51
|
+
the Internet.
|
52
|
+
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Ashworth Expires October 3, 1997 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft The Naming of Hosts April 1997
|
59
|
+
|
60
|
+
|
61
|
+
Distribution of this memo is unlimited.
|
62
|
+
|
63
|
+
Except to TS Eliot.
|
64
|
+
|
65
|
+
And, for that matter, to David Addison, who hates iambic pentameter.
|
66
|
+
|
67
|
+
2. Poetry
|
68
|
+
|
69
|
+
The Naming of Hosts is a difficult matter,
|
70
|
+
It isn't just one of your holiday games;
|
71
|
+
You may think at first I'm as mad as a hatter
|
72
|
+
When I tell you, a host must have THREE DIFFERENT NAMES.
|
73
|
+
|
74
|
+
First of all, there's the name that the users use daily,
|
75
|
+
Such as venus, athena, and cisco, and ames,
|
76
|
+
Such as titan or sirius, hobbes or europa--
|
77
|
+
All of them sensible everyday names.
|
78
|
+
|
79
|
+
There are fancier names if you think they sound sweeter,
|
80
|
+
Some for the web pages, some for the flames:
|
81
|
+
Such as mercury, phoenix, orion, and charon--
|
82
|
+
But all of them sensible everyday names.
|
83
|
+
|
84
|
+
But I tell you, a host needs a name that's particular,
|
85
|
+
A name that's peculiar, and more dignified,
|
86
|
+
Else how can it keep its home page perpendicular,
|
87
|
+
And spread out its data, send pages world wide?
|
88
|
+
|
89
|
+
Of names of this kind, I can give you a quorum,
|
90
|
+
Like lothlorien, pothole, or kobyashi-maru,
|
91
|
+
Such as pearly-gates.vatican, or else diplomatic-
|
92
|
+
Names that never belong to more than one host.
|
93
|
+
|
94
|
+
But above and beyond there's still one name left over,
|
95
|
+
And that is the name that you never will guess;
|
96
|
+
The name that no human research can discover--
|
97
|
+
But THE NAMESERVER KNOWS, and will us'ually confess.
|
98
|
+
|
99
|
+
When you notice a client in rapt meditation,
|
100
|
+
The reason, I tell you, is always the same:
|
101
|
+
The code is engaged in a deep consultation
|
102
|
+
On the address, the address, the address of its name:
|
103
|
+
|
104
|
+
|
105
|
+
|
106
|
+
|
107
|
+
|
108
|
+
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Ashworth Expires October 3, 1997 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft The Naming of Hosts April 1997
|
115
|
+
|
116
|
+
|
117
|
+
It's ineffable,
|
118
|
+
effable,
|
119
|
+
Effanineffable,
|
120
|
+
Deep and inscrutable,
|
121
|
+
singular
|
122
|
+
Name.
|
123
|
+
|
124
|
+
3. Credits
|
125
|
+
|
126
|
+
Thanks to Don Libes, Mark Lottor, and a host of twisted
|
127
|
+
individuals^W^Wcreative sysadmins for providing source material for
|
128
|
+
this memo, to Andrew Lloyd-Webber, Cameron Mackintosh, and a cast of
|
129
|
+
thousands (particularly including Terrance Mann) who drew my
|
130
|
+
attention to the necessity, and of course, to Thomas Stearns Eliot,
|
131
|
+
for making this all necessary.
|
132
|
+
|
133
|
+
4. Security Considerations
|
134
|
+
|
135
|
+
Security issues are not discussed in this memo.
|
136
|
+
|
137
|
+
Particularly the cardiac security of certain famous poets.
|
138
|
+
|
139
|
+
5. Informative References
|
140
|
+
|
141
|
+
[1] Libes, D., "Choosing a Name for Your Computer",
|
142
|
+
Communications of the ACM Vol. 32, No. 11, Pg. 1289,
|
143
|
+
November 1989.
|
144
|
+
|
145
|
+
[2] Lottor, M., "Domain Name Survey", January 1997,
|
146
|
+
<namedroppers@internic.net>.
|
147
|
+
|
148
|
+
[3] Stearns, TS., "Old Possum's Book of Practical Cats".
|
149
|
+
|
150
|
+
[4] Wong, M., "Cool Hostnames",
|
151
|
+
<http://www.seas.upenn.edu/~mengwong/coolhosts.html>.
|
152
|
+
|
153
|
+
Author's Address
|
154
|
+
|
155
|
+
Jay R. Ashworth
|
156
|
+
Advanced Technology Consulting
|
157
|
+
St. Petersburg FL 33709-4819
|
158
|
+
|
159
|
+
Phone: +1 813 790 7592
|
160
|
+
Email: jra@scfn.thpl.lib.fl.us
|
161
|
+
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Ashworth Expires October 3, 1997 [Page 3]
|
@@ -0,0 +1,336 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Network Working Group S. Bellovin
|
6
|
+
Internet-Draft AT&T Labs Research
|
7
|
+
Intended status: Informational April 1, 2003
|
8
|
+
Expires: October 3, 2003
|
9
|
+
|
10
|
+
|
11
|
+
The Security Flag in the IPv4 Header
|
12
|
+
rfc-3514
|
13
|
+
|
14
|
+
Abstract
|
15
|
+
|
16
|
+
Firewalls, packet filters, intrusion detection systems, and the like
|
17
|
+
often have difficulty distinguishing between packets that have
|
18
|
+
malicious intent and those that are merely unusual. We define a
|
19
|
+
security flag in the IPv4 header as a means of distinguishing the two
|
20
|
+
cases.
|
21
|
+
|
22
|
+
Status of This Memo
|
23
|
+
|
24
|
+
This Internet-Draft is submitted in full conformance with the
|
25
|
+
provisions of BCP 78 and BCP 79.
|
26
|
+
|
27
|
+
Internet-Drafts are working documents of the Internet Engineering
|
28
|
+
Task Force (IETF). Note that other groups may also distribute
|
29
|
+
working documents as Internet-Drafts. The list of current Internet-
|
30
|
+
Drafts is at http://datatracker.ietf.org/drafts/current/.
|
31
|
+
|
32
|
+
Internet-Drafts are draft documents valid for a maximum of six months
|
33
|
+
and may be updated, replaced, or obsoleted by other documents at any
|
34
|
+
time. It is inappropriate to use Internet-Drafts as reference
|
35
|
+
material or to cite them other than as "work in progress."
|
36
|
+
|
37
|
+
This Internet-Draft will expire on October 3, 2003.
|
38
|
+
|
39
|
+
Copyright Notice
|
40
|
+
|
41
|
+
Copyright (c) 2003 IETF Trust and the persons identified as the
|
42
|
+
document authors. All rights reserved.
|
43
|
+
|
44
|
+
This document is subject to BCP 78 and the IETF Trust's Legal
|
45
|
+
Provisions Relating to IETF Documents
|
46
|
+
(http://trustee.ietf.org/license-info) in effect on the date of
|
47
|
+
publication of this document. Please review these documents
|
48
|
+
carefully, as they describe your rights and restrictions with respect
|
49
|
+
to this document. Code Components extracted from this document must
|
50
|
+
include Simplified BSD License text as described in Section 4.e of
|
51
|
+
the Trust Legal Provisions and are provided without warranty as
|
52
|
+
described in the Simplified BSD License.
|
53
|
+
|
54
|
+
|
55
|
+
|
56
|
+
Bellovin Expires October 3, 2003 [Page 1]
|
57
|
+
|
58
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
59
|
+
|
60
|
+
|
61
|
+
Table of Contents
|
62
|
+
|
63
|
+
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
64
|
+
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
|
65
|
+
2. Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
66
|
+
3. Setting the Evil Bit . . . . . . . . . . . . . . . . . . . . 3
|
67
|
+
4. Processing of the Evil Bit . . . . . . . . . . . . . . . . . 4
|
68
|
+
5. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 4
|
69
|
+
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
|
70
|
+
7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
|
71
|
+
8. Normative References . . . . . . . . . . . . . . . . . . . . 5
|
72
|
+
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6
|
73
|
+
|
74
|
+
1. Introduction
|
75
|
+
|
76
|
+
Firewalls [CBR03], packet filters, intrusion detection systems, and
|
77
|
+
the like often have difficulty distinguishing between packets that
|
78
|
+
have malicious intent and those that are merely unusual. The problem
|
79
|
+
is that making such determinations is hard. To solve this problem,
|
80
|
+
we define a security flag, known as the "evil" bit, in the IPv4
|
81
|
+
[RFC0791] header. Benign packets have this bit set to 0; those that
|
82
|
+
are used for an attack will have the bit set to 1.
|
83
|
+
|
84
|
+
1.1. Terminology
|
85
|
+
|
86
|
+
The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
|
87
|
+
SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
|
88
|
+
document, are to be interpreted as described in [RFC2119].
|
89
|
+
|
90
|
+
2. Syntax
|
91
|
+
|
92
|
+
The high-order bit of the IP fragment offset field is the only unused
|
93
|
+
bit in the IP header. Accordingly, the selection of the bit position
|
94
|
+
is not left to IANA.
|
95
|
+
|
96
|
+
The bit field is laid out as follows:
|
97
|
+
|
98
|
+
0
|
99
|
+
+-+
|
100
|
+
|E|
|
101
|
+
+-+
|
102
|
+
|
103
|
+
Currently-assigned values are defined as follows:
|
104
|
+
|
105
|
+
0x0:
|
106
|
+
If the bit is set to 0, the packet has no evil intent. Hosts,
|
107
|
+
network elements, etc., SHOULD assume that the packet is harmless,
|
108
|
+
and SHOULD NOT take any defensive measures. (We note that this
|
109
|
+
|
110
|
+
|
111
|
+
|
112
|
+
Bellovin Expires October 3, 2003 [Page 2]
|
113
|
+
|
114
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
115
|
+
|
116
|
+
|
117
|
+
part of the spec is already implemented by many common desktop
|
118
|
+
operating systems.)
|
119
|
+
|
120
|
+
0x1:
|
121
|
+
If the bit is set to 1, the packet has evil intent. Secure
|
122
|
+
systems SHOULD try to defend themselves against such packets.
|
123
|
+
Insecure systems MAY chose to crash, be penetrated, etc.
|
124
|
+
|
125
|
+
3. Setting the Evil Bit
|
126
|
+
|
127
|
+
There are a number of ways in which the evil bit may be set. Attack
|
128
|
+
applications may use a suitable API to request that it be set.
|
129
|
+
Systems that do not have other mechanisms MUST provide such an API;
|
130
|
+
attack programs MUST use it.
|
131
|
+
|
132
|
+
Multi-level insecure operating systems may have special levels for
|
133
|
+
attack programs; the evil bit MUST be set by default on packets
|
134
|
+
emanating from programs running at such levels. However, the system
|
135
|
+
_MAY_ provide an API to allow it to be cleared for non-malicious
|
136
|
+
activity by users who normally engage in attack behavior.
|
137
|
+
|
138
|
+
Fragments that by themselves are dangerous MUST have the evil bit
|
139
|
+
set. If a packet with the evil bit set is fragmented by an
|
140
|
+
intermediate router and the fragments themselves are not dangerous,
|
141
|
+
the evil bit MUST be cleared in the fragments, and MUST be turned
|
142
|
+
back on in the reassembled packet.
|
143
|
+
|
144
|
+
Intermediate systems are sometimes used to launder attack
|
145
|
+
connections. Packets to such systems that are intended to be relayed
|
146
|
+
to a target SHOULD have the evil bit set.
|
147
|
+
|
148
|
+
Some applications hand-craft their own packets. If these packets are
|
149
|
+
part of an attack, the application MUST set the evil bit by itself.
|
150
|
+
|
151
|
+
In networks protected by firewalls, it is axiomatic that all
|
152
|
+
attackers are on the outside of the firewall. Therefore, hosts
|
153
|
+
inside the firewall MUST NOT set the evil bit on any packets.
|
154
|
+
|
155
|
+
Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil
|
156
|
+
bit on such packets. "Transparent" http and email proxies SHOULD set
|
157
|
+
the evil bit on their reply packets to the innocent client host.
|
158
|
+
|
159
|
+
Some hosts scan other hosts in a fashion that can alert intrusion
|
160
|
+
detection systems. If the scanning is part of a benign research
|
161
|
+
project, the evil bit MUST NOT be set. If the scanning per se is
|
162
|
+
innocent, but the ultimate intent is evil and the destination site
|
163
|
+
has such an intrusion detection system, the evil bit SHOULD be set.
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
|
168
|
+
Bellovin Expires October 3, 2003 [Page 3]
|
169
|
+
|
170
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
171
|
+
|
172
|
+
|
173
|
+
4. Processing of the Evil Bit
|
174
|
+
|
175
|
+
Devices such as firewalls MUST drop all inbound packets that have the
|
176
|
+
evil bit set. Packets with the evil bit off MUST NOT be dropped.
|
177
|
+
Dropped packets SHOULD be noted in the appropriate MIB variable.
|
178
|
+
|
179
|
+
Intrusion detection systems (IDSs) have a harder problem. Because of
|
180
|
+
their known propensity for false negatives and false positives, IDSs
|
181
|
+
MUST apply a probabilistic correction factor when evaluating the evil
|
182
|
+
bit. If the evil bit is set, a suitable random number generator
|
183
|
+
[RFC1750] must be consulted to determine if the attempt should be
|
184
|
+
logged. Similarly, if the bit is off, another random number
|
185
|
+
generator must be consulted to determine if it should be logged
|
186
|
+
despite the setting.
|
187
|
+
|
188
|
+
The default probabilities for these tests depends on the type of IDS.
|
189
|
+
Thus, a signature-based IDS would have a low false positive value but
|
190
|
+
a high false negative value. A suitable administrative interface
|
191
|
+
MUST be provided to permit operators to reset these values.
|
192
|
+
|
193
|
+
Routers that are not intended as as security devices SHOULD NOT
|
194
|
+
examine this bit. This will allow them to pass packets at higher
|
195
|
+
speeds.
|
196
|
+
|
197
|
+
As outlined earlier, host processing of evil packets is operating-
|
198
|
+
system dependent; however, all hosts MUST react appropriately
|
199
|
+
according to their nature.
|
200
|
+
|
201
|
+
5. Related Work
|
202
|
+
|
203
|
+
Although this document only defines the IPv4 evil bit, there are
|
204
|
+
complementary mechanisms for other forms of evil. We sketch some of
|
205
|
+
those here.
|
206
|
+
|
207
|
+
For IPv6 [RFC2460], evilness is conveyed by two options. The first,
|
208
|
+
a hop-by-hop option, is used for packets that damage the network,
|
209
|
+
such as DDoS packets. The second, an end-to-end option, is for
|
210
|
+
packets intended to damage destination hosts. In either case, the
|
211
|
+
option contains a 128-bit strength indicator, which says how evil the
|
212
|
+
packet is, and a 128-bit type code that describes the particular type
|
213
|
+
of attack intended.
|
214
|
+
|
215
|
+
Some link layers, notably those based on optical switching, may
|
216
|
+
bypass routers (and hence firewalls) entirely. Accordingly, some
|
217
|
+
link-layer scheme MUST be used to denote evil. This may involve evil
|
218
|
+
lambdas, evil polarizations, etc.
|
219
|
+
|
220
|
+
DDoS attack packets are denoted by a special diffserv code point.
|
221
|
+
|
222
|
+
|
223
|
+
|
224
|
+
Bellovin Expires October 3, 2003 [Page 4]
|
225
|
+
|
226
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
227
|
+
|
228
|
+
|
229
|
+
An application/evil MIME type is defined for Web- or email-carried
|
230
|
+
mischief. Other MIME types can be embedded inside of evil sections;
|
231
|
+
this permit easy encoding of word processing documents with macro
|
232
|
+
viruses, etc.
|
233
|
+
|
234
|
+
6. IANA Considerations
|
235
|
+
|
236
|
+
This document defines the behavior of security elements for the 0x0
|
237
|
+
and 0x1 values of this bit. Behavior for other values of the bit may
|
238
|
+
be defined only by IETF consensus [RFC2434].
|
239
|
+
|
240
|
+
7. Security Considerations
|
241
|
+
|
242
|
+
Correct functioning of security mechanisms depend critically on the
|
243
|
+
evil bit being set properly. If faulty components do not set the
|
244
|
+
evil bit to 1 when appropriate, firewalls will not be able to do
|
245
|
+
their jobs properly. Similarly, if the bit is set to 1 when it
|
246
|
+
shouldn't be, a denial of service condition may occur.
|
247
|
+
|
248
|
+
8. Normative References
|
249
|
+
|
250
|
+
[CBR03] Cheswick, W., Bellovin, S., and A. Rubin, "Firewalls and
|
251
|
+
Internet Security: Repelling the Wily Hacker, Second
|
252
|
+
Edition", Addison-Wesley , 2003.
|
253
|
+
|
254
|
+
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
|
255
|
+
DOI 10.17487/RFC0791, September 1981,
|
256
|
+
<https://www.rfc-editor.org/info/rfc791>.
|
257
|
+
|
258
|
+
[RFC1750] Eastlake 3rd, D., Crocker, S., and J. Schiller,
|
259
|
+
"Randomness Recommendations for Security", RFC 1750,
|
260
|
+
DOI 10.17487/RFC1750, December 1994,
|
261
|
+
<https://www.rfc-editor.org/info/rfc1750>.
|
262
|
+
|
263
|
+
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
264
|
+
Requirement Levels", BCP 14, RFC 2119,
|
265
|
+
DOI 10.17487/RFC2119, March 1997,
|
266
|
+
<https://www.rfc-editor.org/info/rfc2119>.
|
267
|
+
|
268
|
+
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
|
269
|
+
IANA Considerations Section in RFCs", RFC 2434,
|
270
|
+
DOI 10.17487/RFC2434, October 1998,
|
271
|
+
<https://www.rfc-editor.org/info/rfc2434>.
|
272
|
+
|
273
|
+
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
|
274
|
+
(IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
|
275
|
+
December 1998, <https://www.rfc-editor.org/info/rfc2460>.
|
276
|
+
|
277
|
+
|
278
|
+
|
279
|
+
|
280
|
+
Bellovin Expires October 3, 2003 [Page 5]
|
281
|
+
|
282
|
+
Internet-Draft The Security Flag in the IPv4 Header April 2003
|
283
|
+
|
284
|
+
|
285
|
+
[RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
|
286
|
+
Address Translator (Traditional NAT)", RFC 3022,
|
287
|
+
DOI 10.17487/RFC3022, January 2001,
|
288
|
+
<https://www.rfc-editor.org/info/rfc3022>.
|
289
|
+
|
290
|
+
Author's Address
|
291
|
+
|
292
|
+
Steven M. Bellovin
|
293
|
+
AT&T Labs Research
|
294
|
+
180 Park Avenue
|
295
|
+
Florham Park NJ 07932
|
296
|
+
|
297
|
+
Phone: +1 973-360-8656
|
298
|
+
Email: bellovin@acm.org
|
299
|
+
|
300
|
+
|
301
|
+
|
302
|
+
|
303
|
+
|
304
|
+
|
305
|
+
|
306
|
+
|
307
|
+
|
308
|
+
|
309
|
+
|
310
|
+
|
311
|
+
|
312
|
+
|
313
|
+
|
314
|
+
|
315
|
+
|
316
|
+
|
317
|
+
|
318
|
+
|
319
|
+
|
320
|
+
|
321
|
+
|
322
|
+
|
323
|
+
|
324
|
+
|
325
|
+
|
326
|
+
|
327
|
+
|
328
|
+
|
329
|
+
|
330
|
+
|
331
|
+
|
332
|
+
|
333
|
+
|
334
|
+
|
335
|
+
|
336
|
+
Bellovin Expires October 3, 2003 [Page 6]
|