Hi, All,
My apologies for the delay in my response -- I've clearly missed the
WGLC deadline. But, hopefully "better late than never".
Some comments on version -01 of this document:
* Section 4:
I believe some discussion is warranted about how this might affect the
measurements themselves. e.g.,
* SYN-scans containing data might be discarded
* Also, if you're UDP-probing, the UDP probe packet needs to impleent
the target protocol, or else it won't elicit a response. This in turn
means that most likely you won´t be able to encode the URI in the probe
packet.
* When probing over IPv6, including EHs will definitely affect the probe
results (as per e.g. RFC7872)
* Section 4, page 5:
* for a [RFC793] TCP packet with the SYN flag: data is allowed in
TCP packets with the SYN flag per section 3.4 of [RFC793] (2nd
paragraph). However, it may change the way the packet is
processed;
s/793/9293/
* Section 4, page 5:
* for a [RFC8200] IPv6 packet with either hop-by-hop or destination
options headers, in a PadN option. However, the PadN option is
not recommended: as per the informational [RFC4942], section
2.1.9.5, it is suggested that PadN options should only contain 0's
and be smaller than 8 octets, thus limiting its use for probe
attribution. Indeed, inserting the probe description URI in PadN
options could bias the measurement itself.
So... what would be the recommended approach for including the URI, if
any, in an IPv6 probe packet?
* Section 4, page 5:
For example, the Linux
Kernel follows these recommendations since its version 3.5;
Is the "recommendation" to drop these packets? Either way, please
clarify this.
* Section 4, page 5:
The probe description URI should start at the first octet of the
payload and should be terminated by an octet of 0x00, i.e., it must
be null terminated. If the probe description URI cannot be placed at
the beginning of the payload, then it should be preceded by an octet
of 0x00.
There should be some discussion about MTU related issues. e.g., what if
including the URI would cause the probe packet to be larger than the
minimum IPv4 MTU (68 bytes) or minimum IPv6 MTU (1280 bytes)?
(since this would also affect the probe results themselves)
* Section 5, page 6:
Both out-of-band and in-band combined should be preferred. It could
be used as an indirect means of "authenticating" the probe
description URI in the in-band probe, thanks to a correlation with
the out-of-band technique (e.g., a reverse DNS lookup). However, the
out-of-band technique might not be possible due to several
conditions: the presence of a NAT, too many endpoints to run a web
server on (e.g., RIPE Atlas probes)
I'd add a reference for RIPE Atlas.
* Section 7, page 6:
This information is provided to identify the source and intent of
specific probes, but there is no authentication possible for the
inline information. As a result, a malevolent actor could provide
false information while conducting the probes, so that the action is
attributed to a third party. As a consequence, the recipient of this
information cannot trust this information without confirmation. If a
recipient cannot confirm the information or does not wish to do so,
it should treat the flows as if there were no attribution.
This probably also make a case for favoring out-of-band signaling...
* Section 8, page 7:
8. IANA Considerations
The "Well-Known URIs" registry should be updated with the following
additional values (using the template from [RFC8615]):
* URI suffix: probing.txt
* Change controller: IETF
* Specification document(s): this document
Should the document be std track for this? (particularly when the tet
says "specification")
Thanks, and my apologies for my sub-optimal timing!
Regards,
Fernando
On 10/1/23 21:17, Jen Linkova wrote:
Hello,
This email starts the WGLC for draft-ietf-opsec-probe-attribution
(https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/).
The WGLC ends on Sun, Jan 29th, 23:59:59UTC.
Please review the draft and send comments/suggestions/opinions to the list.
Thank you!
--
SY, Jen Linkova aka Furry on behalf of OpSec chairs.
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec
--
Fernando Gont
SI6 Networks
e-mail: [email protected]
PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec