Skip to main content

More Secure IPv6 Routing Header Processing
draft-smith-6man-more-secure-rh-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Author Mark Smith
Last updated 2022-02-14
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-smith-6man-more-secure-rh-00
Internet Engineering Task Force                               M.R. Smith
Internet-Draft                                          14 February 2022
Updates: 5095, 8200 (if approved)                                       
Intended status: Standards Track                                        
Expires: 18 August 2022

               More Secure IPv6 Routing Header Processing
                   draft-smith-6man-more-secure-rh-00

Abstract

   The original IPv6 Type 0 Routing Header has been deprecated due to
   the security risk of a packet forwarding loop being formed, by
   specifying a large sequence of alternating IPv6 node addresses to
   visit.  This memo proposes a method to prevent these forwarding loops
   forming, allowing the IPv6 Type 0 Routing Header to be more securely
   and safely used.  The method is also more generally applicable to any
   unicast source routing.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 18 August 2022.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Smith                    Expires 18 August 2022                 [Page 1]
Internet-Draft  More Secure IPv6 Routing Header Processi   February 2022

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  The Fundamental Problem . . . . . . . . . . . . . . . . . . .   3
   3.  Solution  . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  Method  . . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   5.  ICMPv6 Destination Unreachable, Routing Header RPF Check
           Failed  . . . . . . . . . . . . . . . . . . . . . . . . .   4
   6.  Updates to RFC8200  . . . . . . . . . . . . . . . . . . . . .   4
   7.  More General Applicability  . . . . . . . . . . . . . . . . .   4
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   5
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   5
   11. Change Log [RFC Editor please remove] . . . . . . . . . . . .   5
   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     12.1.  Normative References . . . . . . . . . . . . . . . . . .   5
     12.2.  Informative References . . . . . . . . . . . . . . . . .   5
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   6

1.  Introduction

   [RFC5095] deprecated the IPv6 Type 0 Routing Header as it could be
   used to create a traffic loop, by specifying a large sequence of
   alternating IPv6 node addresses to visit.  This traffic loop could
   consume large amounts of network capacity, causing congestion, and
   possibly a network capacity denial of service attack.  (The packets
   caught in the forwarding loop would eventually be dropped as their
   hop-count field will eventually reach zero.)

   This memo specifies a method of preventing these traffic loops
   occurring, which allows the IPv6 Type 0 and most other source Routing
   Headers to be safely used.

Smith                    Expires 18 August 2022                 [Page 2]
Internet-Draft  More Secure IPv6 Routing Header Processi   February 2022

2.  The Fundamental Problem

   The fundamental problem with the type 0 RH, and other source Routing
   Headers that support multiple routing hops in general, is that
   packets can be made to travel back towards where they've come from.
   This then facilitates the first step of a packet being able to enter
   a forwarding loop.

3.  Solution

   Packets need to be prevented from travelling back towards where
   they've come from, which then prevents a forwarding loop from being
   formed.

   The problem of packets going back towards where they've come from
   exists in multicast, and has been solved by performing a Reverse Path
   Forwarding (RPF) check on a packet as part of the multicast
   forwarding procedure.

   This RPF check ensures that a packet does not leave via the router in
   direction back towards the packet's source address.  This direction
   back towards the packet's source may be via the packet's ingress
   interface, or a different egress interface back towards the packet's
   source in an asymmetric routing scenario.

   [RFC3704], although describing RPF checks to prevent source IP
   address spoofing, provides good descriptions of the RPF checking
   process.

4.  Method

   The following method is used to process IPv6 Type 0 Routing Headers
   while also preventing their packets from entering a forwarding loop.

   1.  Perform the Type 0 Routing Header processing algorithm as
       specified in [RFC2460], section 4.4.  This will result in the
       packet's Type 0 Routing Header and Destination Address being
       updated to the next address specified in the routing header to
       visit.

   2.  Perform an RPF check against the updated packet.

   3.  If the packet is to now travel back towards its source, discard
       the packet, and generate an ICMPv6 Destination Unreachable,
       Routing Header RPF Check Failed error (specified below), sending
       it to the packet's source (address).

   4.  Otherwise, forward the packet to its new Destination Address.

Smith                    Expires 18 August 2022                 [Page 3]
Internet-Draft  More Secure IPv6 Routing Header Processi   February 2022

   Note that an implementation could perform the RPF check against the
   next address specified in the Type 0 Routing Header before updating
   the packet's Type 0 Routing Header and Destination Address field as a
   processing optimisation.  If the RPF check fails in this case, the
   packet's Type 0 Routing Header and Destination Address will need to
   be updated so that it can then be correctly used as the message body
   for the ICMPv6 Destination Unreachable error message [RFC4443].

5.  ICMPv6 Destination Unreachable, Routing Header RPF Check Failed

   A new ICMPv6 Destination Unreachable error message is defined for a
   "Routing Header RPF Check Failed", Type 1, Code [IANA-TBD].
   Processing of this error message is as per the general Destination
   Unreachable message processing specified in [RFC4443].  There is no
   special handling of this error message at the receiver.

6.  Updates to RFC8200

   This memo makes the reason for the IPv6 Type 0 Routing Header
   deprecation invalid.  Consequently, [RFC8200] is updated to now
   specify the Type 0 Routing Header formerly specified in [RFC2460].

7.  More General Applicability

   The method of preventing a packet or a frame from travelling back
   towards its origin when being forwarded can be applied to any unicast
   source routing scenario where a forwarding loop is possible.

   Examples of where it could be applied are the IPv6 Segment Routing
   Header [RFC8754], Segment Routing over MPLS [RFC8660], the IPv6
   Compressed Rouing Header [CRH] and IPv4 [RFC0791] (and perhaps Token
   Ring Source Route Bridging [IEEE 802.2]?).

8.  Security Considerations

   This memo addresses the primary security issue that caused the Type 0
   Routing Header to be deprecated.

   This memo does not address other security issues related to routing
   headers and source routing, such as using a routing header to bypass
   a security policy enforcement device, or untrusted packets with
   routing headers entering a routing header trusting domain.  Other
   mitigations to these security issues, such as source address
   filtering at ingress to the local network, or packet authentication
   [RFC4302], need to be deployed.

Smith                    Expires 18 August 2022                 [Page 4]
Internet-Draft  More Secure IPv6 Routing Header Processi   February 2022

9.  IANA Considerations

   IANA are requested to allocate a suitable Type 1 Destination
   Unreachable error code for "Routing Header RPF Check Failed".

10.  Acknowledgements

   Review and comments were provided by YOUR NAME HERE!

   This memo was prepared using the xml2rfc tool.

11.  Change Log [RFC Editor please remove]

   draft-smith-6man-more-secure-rh-00, initial version, 2022-02-14

12.  References

12.1.  Normative References

   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
              December 1998, <https://www.rfc-editor.org/info/rfc2460>.

   [RFC4443]  Conta, A., Deering, S., and M. Gupta, Ed., "Internet
              Control Message Protocol (ICMPv6) for the Internet
              Protocol Version 6 (IPv6) Specification", STD 89,
              RFC 4443, DOI 10.17487/RFC4443, March 2006,
              <https://www.rfc-editor.org/info/rfc4443>.

   [RFC8200]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", STD 86, RFC 8200,
              DOI 10.17487/RFC8200, July 2017,
              <https://www.rfc-editor.org/info/rfc8200>.

12.2.  Informative References

   [CRH]      "The IPv6 Compact Routing Header (CRH)",
              <https://datatracker.ietf.org/doc/draft-bonica-6man-comp-
              rtg-hdr/>.

   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,
              DOI 10.17487/RFC0791, September 1981,
              <https://www.rfc-editor.org/info/rfc791>.

   [RFC3704]  Baker, F. and P. Savola, "Ingress Filtering for Multihomed
              Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
              2004, <https://www.rfc-editor.org/info/rfc3704>.

Smith                    Expires 18 August 2022                 [Page 5]
Internet-Draft  More Secure IPv6 Routing Header Processi   February 2022

   [RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,
              DOI 10.17487/RFC4302, December 2005,
              <https://www.rfc-editor.org/info/rfc4302>.

   [RFC5095]  Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
              of Type 0 Routing Headers in IPv6", RFC 5095,
              DOI 10.17487/RFC5095, December 2007,
              <https://www.rfc-editor.org/info/rfc5095>.

   [RFC8660]  Bashandy, A., Ed., Filsfils, C., Ed., Previdi, S.,
              Decraene, B., Litkowski, S., and R. Shakir, "Segment
              Routing with the MPLS Data Plane", RFC 8660,
              DOI 10.17487/RFC8660, December 2019,
              <https://www.rfc-editor.org/info/rfc8660>.

   [RFC8754]  Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
              Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
              (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
              <https://www.rfc-editor.org/info/rfc8754>.

Author's Address

   Mark Smith
   PO BOX 521
   HEIDELBERG VIC 3084
   Australia

   Email: markzzzsmith@gmail.com

Smith                    Expires 18 August 2022                 [Page 6]