Hello Fernando,

Thank you for your quick review, we completely agree with you:

1) the reverse DNS/web server is probably to be preferred, so, we will move the 
section 4 'out of band' before the inband section to put more focus on this 
technique
2) on the URI in the payload, indeed this will not work in every case (for the 
reasons you explained), we will modify the text to make it more clear.

BWT, about the "extension header" and RFC 7872, this is indeed what Raphaël (a 
Master student of Prof. Donnet) is doing right now ;) Our hope is to present it 
at V6OPS at IETF-113. BTW, do you know of a VM/VPS hoster in South America? 
Preferrably using Telefonica as tier-1 

Regards

-éric

-----Original Message-----
From: Fernando Gont <[email protected]>
Date: Friday, 18 February 2022 at 14:55
To: Eric Vyncke <[email protected]>, "[email protected]" <[email protected]>
Cc: Benoît <[email protected]>, Justin Iurman <[email protected]>
Subject: Re: [OPSEC] New OPSEC individual draft on probe attribution

    Hi, Eric, and all,

    Thanks for the heads up on this document!

    FWIW, I agree with the "principle, but not with the proposed solution.

    Meta: the easiest way to provide information about the probe is to:

    1) simply run a web server on the probing machine, with a web page that
       describes the experiment, and/or,

    2) have a reverse mapping in the DNS that hints about what's going on,
       and possible leads to a web page as #1 above.

    Regarding the proposed "in-band probe attribution", this is generally
    not possible, since it may interfere with the probing experiment itself.
    e.g.:


    > 3.  In-band Probe Attribution
    >
    >    When the desired measurement allows for it, one "probe description
    >    URI" should be included in the payload of all probes sent.  This
    >    could be:
    >
    >    *  for a [RFC4443] ICMPv6 echo request: in the optional data (see
    >       section 4.1 of [RFC443]);
    >
    >    *  for a [RFC792] ICMPv4 echo request: in the optional data;

    These two *may* be possible. But:
    1) You'd normally not use ping for probing, since it may be filtered
        and/or rate-limited.

    2) Sensors at the target network might be configured to not capture the
        payload




    >    *  for a [RFC768] UDP datagram: in the data part;

    This one is not possible: When scanning UDP services, the probe packet
    needs to be a valid request for the target service -- otherwise it would
    not elicit a response.



    >    *  for a [RFC793] TCP packet with the SYN flag: data is allowed in
    >       TCP packets with the SYN flag per section 3.4 of [RFC793] (2nd
    >       paragraph);

    This is theoretically possible -- maybe feasible now. But for quite some
    time this wouldn;t work (implementation bugs that wouldn't allow data in
    the SYN, even when protocol-wise legitimate), and because firewalls
    would block these.


    >
    >    *  for a [RFC8200] IPv6 packet with either hop-by-hop or destination
    >       options headers, in the PadN option.  Note that, per the
    >       informational [RFC4942] section 2.1.9.5, it is suggested that PadN
    >       option should only contain 0x0 and be smaller than 8 octets, so
    >       the proposed insertion of the URI in PadN option could have
    >       influence on the measurement itself;

    You'd probably never use IPv6 EHs for probing, since the reliability of
    the experiment will be degraded significantly -- unless you're actually
    trying to measure *that* (as in RFC7872 ;-) ).

    Thanks!

    Regards,
    --
    Fernando Gont
    Director of Information Security
    EdgeUno
    PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531




    “This communication is the property of EdgeUno or one of its group 
companies and/or affiliates. This electronic message contains information which 
may be privileged or confidential. The information is intended to be for the 
exclusive use of the individual(s) named above and if you are not the intended 
recipient be aware that any non-explicitly authorized disclosure, copying, 
distribution or use of the contents of this information, even if partially, 
including attached files, is strictly prohibited, and will be considered a 
criminal offense. Please notify [email protected] about the unintended receipt 
of this electronic message and delete it.”

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to