One document matched: draft-baker-v6ops-greynet-04.xml
<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- Some of the more generally applicable PIs that most I-Ds might want to use -->
<!-- Try to enforce the ID-nits conventions and DTD validity -->
<?rfc strict="yes" ?>
<!-- Items used when reviewing the document -->
<?rfc comments="no" ?>
<!-- Controls display of <cref> elements -->
<?rfc inline="no" ?>
<!-- When no, put comments at end in comments section,
otherwise, put inline -->
<?rfc editing="no" ?>
<!-- When yes, insert editing marks: editing marks consist of a
string such as <29> printed in the blank line at the
beginning of each paragraph of text. -->
<!-- Create Table of Contents (ToC) and set some options for it.
Note the ToC may be omitted for very short documents,but idnits insists on a ToC
if the document has more than 15 pages. -->
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<!-- If "yes" eliminates blank lines before main section entries. -->
<?rfc tocdepth="3"?>
<!-- Sets the number of levels of sections/subsections... in ToC -->
<!-- Choose the options for the references.
Some like symbolic tags in the references (and citations) and others prefer
numbers. The RFC Editor always uses symbolic tags.
The tags used are the anchor attributes of the references. -->
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<!-- If "yes", causes the references to be sorted in order of tags.
This doesn't have any effect unless symrefs is "yes" also. -->
<!-- These two save paper: Just setting compact to "yes" makes savings by not starting each
main section on a new page but does not omit the blank lines between list items.
If subcompact is also "yes" the blank lines between list items are also omitted. -->
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<!-- end of list of popular I-D processing instructions -->
<!-- end of list of processing instructions -->
<rfc category="info" docName="draft-baker-v6ops-greynet-04" ipr="trust200902">
<front>
<title abbrev="">IPv4 and IPv6 Greynets</title>
<author fullname="Fred Baker" initials="F.J." surname="Baker">
<organization>Cisco Systems</organization>
<address>
<postal>
<street></street>
<city>Santa Barbara</city>
<code>93117</code>
<region>California</region>
<country>USA</country>
</postal>
<email>fred@cisco.com</email>
</address>
</author>
<author fullname="Warren Harrop" initials="W." surname="Harrop">
<organization>CAIA, Swinburne University of Technology</organization>
<address>
<postal>
<street></street>
<city>Hawthorn</city>
<code>3122</code>
<region>Victoria</region>
<country>Australia</country>
</postal>
<email>wazz@bud.cc.swin.edu.au</email>
</address>
</author>
<author fullname="Grenville Armitage" initials="G." surname="Armitage">
<organization>CAIA, Swinburne University of Technology</organization>
<address>
<postal>
<street></street>
<city>Hawthorn</city>
<code>3122</code>
<region>Victoria</region>
<country>Australia</country>
</postal>
<email>garmitage@swin.edu.au</email>
</address>
</author>
<date year="2010" />
<area>Operations</area>
<workgroup>IPv6 Operations</workgroup>
<abstract>
<t>This note discusses a feature to support building Greynets for IPv4
and IPv6.</t>
</abstract>
<!--
<note title='Foreword'>
</note>
-->
<!--
<note title="Requirements">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref
target="RFC2119"></xref>.</t>
</note>
-->
<!--
<?rfc needLines='10' ?>
<texttable anchor='table_example' title='A Very Simple Table'>
<preamble>Tables use ttcol to define column headers and widths.
Every cell then has a "c" element for its content.</preamble>
<ttcol align='center'>ttcol #1</ttcol>
<ttcol align='center'>ttcol #2</ttcol>
<c>c #1</c> <c>c #2</c>
<c>c #3</c> <c>c #4</c>
<c>c #5</c> <c>c #6</c>
<postamble>which is a very simple example.</postamble>
</texttable>
-->
</front>
<middle>
<!--
<t>There are multiple list styles: 'symbols', 'letters', 'numbers',
'hanging', 'format', etc.</t>
<t>
<list style='symbols'>
<t>First bullet</t>
<t>Second bullet</t>
</list>
</t>
-->
<!--
<figure anchor='reference' title='Figure'>
<artwork align='center'>
<![CDATA[
ASCII artwork goes here...
]]>
</artwork>
</figure>
-->
<section anchor="intro" title="Introduction">
<t>Darknets, also called "Network Telescopes" among other things, have
been deployed by several organizations including CAIDA, Team Cymru, and
the University of Michigan, to look at traffic directed to addresses in
blocks that are not in actual use. Such traffic becomes visible by
either direct capture (it is routed to a collector) or by virtue of its
backscatter (its resulting in ICMP traffic or transport layer
resets).</t>
<t>Darknets, of course, have two problems. As their address spaces
become known, attackers stop probing them, so they are less effective.
Also, the administrators of those prefixes are pressured by RIR policy
and business requirements to deploy them in active networks.</t>
<t><xref target="Harrop"></xref> defines a 'Greynet' by extension, in
these words:</t>
<t><list style="empty">
<t>Darknets are often proposed to monitor for anomalous, externally
sourced traffic, and require large, contiguous blocks of unused IP
addresses - not always feasible for enterprise network operators. We
introduce and evaluate the Greynet - a region of IP address space
that is sparsely populated with "darknet" addresses interspersed
with active (or "lit") IP addresses. Based on a small sample of
traffic collected within a university campus network we saw that
relatively sparse greynets can achieve useful levels of network scan
detection.</t>
</list></t>
<t>In other words, instead of setting aside prefixes that an attacker
might attempt to probe and in so doing court discovery, Harrop proposed
that individual (or small groups of adjacent) addresses in subnets be
set aside for the purpose, using different host identifiers in each
subnet to make it more difficult for an address scan to detect them. The
concept has value in the sense that it is harder to map the addresses or
prefixes out of an attacker's search pattern, as their presence is more
obscure. Harrop's research was carried out using <xref
target="RFC0791">IPv4</xref>, and yielded interesting information.</t>
<t>It has been observed <xref target="RFC5157"></xref> that address
scanning is less effective in <xref target="RFC2460">IPv6</xref>
networks, as there are more addresses to scan. The observation is of
limited value, in that there are other approaches to identifying IPv6
systems, such as reading the 'Received:' lines in SMTP envelopes. Such
attacks can be limited by the use of <xref target="RFC4941">Privacy
Addresses</xref>, which periodically change, rendering such historical
information less useful, but the fact is that such analytic methods
exist. Greynets are a tool that can be used to isolate and analyze
them.</t>
</section>
<section anchor="deployment" title="Deploying Greynets">
<t>Corporate IT departments and other network operators frequently run
collectors or other kinds of sensors. A collector is a computer system
on the Internet that is expressly set up to attract and "trap" nefarious
attempts to penetrate computer systems. Such systems may simply record
the attempt or the datagram that initiated the attempt
(darknets/greynets), or they may act as a decoy, luring in potential
attacks in order to study their activities and study their methods
(honey pots).</t>
<t>To accomplish this, we separate nefarious traffic from that which is
likely normal and important, studying one and facilitating the
other.</t>
<section anchor="routing" title="Deployment using routing - Darknets">
<t>One obvious way to isolate and identify nefarious traffic is to
realize that it is sent to a prefix or address that is not
instantiated. If a campus uses an IPv4 /24 prefix or an IPv6 /56
prefix but contains less than 100 actual subnets, for example, we
might use only odd numbered subnets (128 of the 256 available in that
prefix), and not quite all of those. Knowing that the active prefixes
are more specific and therefore attract appropriate traffic, we might
also advertise the default prefix from the collector, attracting
traffic directed to the uninstantiated prefixes in that routing
domain.</t>
<t>A second question involves mimicking a host under attack; the
collector may simply record this uninvited traffic, or may reply as a
honeypot system.</t>
</section>
<section anchor="non_neighbors"
title="Deployment using sparse address space - Greynets">
<t>IPv4 subnets usually have some unallocated space in them, if only
because CIDR allocates O(2^n) addresses to an IP Subnet and there are
not exactly that many systems there.</t>
<t>Similarly, with active IPv6 prefixes, even a very large switched
LAN is likely to use a small fraction of the available addresses. This
is by design, as discussed in section 2.5.1 of <xref
target="RFC4291"></xref>. If the addresses are distributed reasonably
randomly among the possible values, the likelihood of an attacker
guessing what addresses are in actual use is limited. This gives us an
opportunity with respect to unused addresses within a IP prefix.</t>
<t>Routers use <xref target="RFC0826">IPv4 ARP</xref> and <xref
target="RFC4861">IPv6 Neighbor Discovery</xref> to determine the MAC
address of a neighbor to which a datagram needs to be sent. Both
specifications intend that when a datagram arrives at a router serving
the target prefix, but which doesn't know the MAC address of the
intended destination, it should: <list style="symbols">
<t>Enqueue the datagram,</t>
<t>Emit a Neighbor Solicitation or ARP Request,</t>
<t>Await a Neighbor Advertisement or ARP Response, and</t>
<t>On receipt, dequeue and forward the datagram.</t>
</list></t>
<t>Once the host's MAC address is in the router's tables (and in so
doing the address proven valid), the matter is not an issue.</t>
<t>In <xref target="Harrop"></xref>, the Greynet is described as being
instantiated on an end-host that replies to ARP Requests for all
'dark' IP addresses. However, a small modification to router behavior
can augment this model. As well as queuing or dropping a datagram that
has triggered an ARP Request or Neighbor Solicitation, the router
forwards a copy of this datagram over an independent link to the
Greynet's analytic equipment. This independent link may be a different
physical interface, a circuit, VLAN, tunnel, UDP or other
encapsulation, or in fact any place such a datagram could be handled.
Depending on the requirements of the receiving collector, one could
also imagine summarizing information in a form similar to <xref
target="RFC5101">IPFIX</xref><xref target="RFC5610"></xref>.</t>
<t>The analytic equipment will now receive two types of datagrams. Of
most interest will be those destined for 'dark' IP addresses. Of less
interest will be the irregular case where a datagram arrives for a
legitimate local neighbor who has, for some temporary reason, no MAC
address in the router's tables. Datagrams arriving for an IP
destination for which an ARP reply (or Neighbor Advertisement) has not
yet received might also be forwarded to the analytical equipment over
the independent link - or might not, if they are considered to be
unlikely to provide new analytic information.</t>
<t>Analytic equipment, depending on the router to recognize 'dark' IP
addresses in this manner, can easily track arrival patterns of
datagrams destined to unused parts of the network. It may also
optionally chose to respond to such datagrams, acting as a honeypot to
elicit further datagrams from the remote source.</t>
<t>If the collector replies directly, the attacker may be able to
identify the fact through information in or about the datagram -
datagrams sent to the same IP Subnet may come back with different TTL
values, for example. Hence, it may be advisable for the collector to
send the reply back through the tunnel and therefore as if from the
same IP Subnet. Naturally the collector in this scenario should not
respond to datagrams destined for 'lit' IP addresses - the intended
destination will eventually respond to the router's ARP or Neighbor
Solicitation anyway.</t>
<t>One implication of this model is that ddos attacks terminate on
router subnets within a network, as opposed to stopping on
inter-router links.</t>
</section>
<section title="Other filters">
<t>An obvious extension of the concept would include traffic
identified by other filters as appropriate to send to the collector.
For example, one might configure the system to forward traffic failing
a unicast reverse forwarding path (uRPF) check <xref
target="RFC2827"></xref> to the collector via the same tunnel.</t>
</section>
</section>
<section anchor="sowhat" title="Implications for router design">
<t>The implication for router design applies to the IPv4 ARP and IPv6
Neighbor Discovery algorithms. It might be interesting to provide, under
configuration control, the ability to forward arriving datagrams that
trigger an ARP Request or Neighbor Solicit, and then fail to receive the
intended response, to an interface, circuit, VLAN, or tunnel to an
analytic system.</t>
</section>
<!-- possibly a 'Contributors' section ... -->
<section anchor="IANA" title="IANA Considerations">
<t>This memo asks the IANA for no new parameters.</t>
<t>Note to RFC Editor: This section will have served its purpose if it
correctly tells IANA that no new assignments or registries are required,
or if those assignments or registries are created during the RFC
publication process. From the author's perspective, it may therefore be
removed upon publication as an RFC at the RFC Editor's discretion.</t>
</section>
<section anchor="Security" title="Security Considerations">
<t>This note describes a tool for managing IPv4 and IPv6 network
security. Like any tool, it has limitations and possible attacks. If
discarding traffic under overload is a good thing, then holding and
subsequently forwarding the traffic instead places a potential load on
the network and the router in question, and as such represents a
possible attack. Such an attack has obvious mitigations, however; one
simply, in a manner the operator deems appropriate, selects a subset of
the traffic to forward and discards the rest. In addition, this attack
is not new; it is only changed in character. A stream that would
instantiate the attack today results in a load of ARP or Neighbor
Solicit messages that all listening hosts must intelligently discard.
The new attack additionally consumes bandwidth that is presumably set
aside specifically for that purpose.</t>
<t>The question of exactly what subset of traffic is interesting and
economical to forward is intentionally left open. Key questions in
algorithm design include what can be learned from a given sample (are
bursts happening, and if so with what data?), what the impact on the
router and other equipment in question is, how that might be mitigated,
etc. Possible selection algorithms dependent only on state and
algorithms typically available in a router include: <list
style="symbols">
<t>All datagrams triggering an ARP Request or Neighbor Solicit,</t>
<t>The subset of those that are not responded to within some stated
interval and are therefore likely dark,</t>
<t>The subset of those that are new; if the address is currently
being solicited, forwarding redundant data may not be useful.</t>
<t>All such datagrams up to some rate,</t>
<t>All such datagrams matching (or not matching) a specified filter
rule,</t>
<t>etc.</t>
</list></t>
</section>
<section anchor="Acknowledgements" title="Acknowledgements">
<t>Algorithms for learning about Internet attack behavior by observing
backscatter traffic have been used by CAIDA, University of Michigan,
Team Cymru, and others. Harrop extended them in his research. This
formulation of the notion originated in a discussion among the authors
in 2005. This note grew out of a conversation with Paul Vixie and Rhette
Marsh on Internet traffic sensors; they also made useful comments on it.
Albert Manfredi commented on the distinction between a LAN (as defined
by IEEE 802) and an IP subnet.</t>
<t>Tim Chown <xref target="RFC5157"></xref> has observed that, at least
at this time, address scanning attacks in IPv6 have not been reported in
the wild. Rhette Marsh has suggested the structure of such an attack,
however, and Fred Baker has suggested approaches based on addressing
information exchanged by applications. Hence, we believe that such
issues may be relevant to IPv6 in the future, when IPv6 is a more
interesting target.</t>
<t>Tim Chown and Owen Stephens tested the proposal, and made useful
comments that have been incorporated in this text. His fundamental
comment was, however, that "it works".</t>
</section>
</middle>
<back>
<!-- references split to informative and normative -->
<references title="Normative References">
<?rfc include='reference.RFC.0791' ?>
<?rfc include='reference.RFC.0826' ?>
<?rfc include='reference.RFC.2460'?>
<?rfc include='reference.RFC.4291' ?>
<?rfc include='reference.RFC.4861'?>
<?rfc include='reference.RFC.4941'?>
<reference anchor="Harrop">
<front>
<title>Greynets: a definition and evaluation of sparsely populated
darknets</title>
<author fullname="Warren Harrop" initials="W." surname="Harrop">
<organization>Swinburne University of Technology, Melbourne,
Australia</organization>
</author>
<author fullname="Grenville Armitage" initials="G."
surname="Armitage">
<organization>Swinburne University of Technology, Melbourne,
Australia</organization>
</author>
<date month="" year="2005" />
</front>
<seriesInfo name="IEEE LCN"
value="IEEE 30th Conference on Local Computer Networks" />
<format target="http://ieeexplore.ieee.org/ielx5/10397/33047/01550875.pdf?tp="
type="PDF" />
</reference>
</references>
<references title="Informative references">
<?rfc include='reference.RFC.2827' ?>
<?rfc include="reference.RFC.5101" ?>
<?rfc include='reference.RFC.5157'?>
<?rfc include="reference.RFC.5610" ?>
</references>
</back>
</rfc>
| PAFTECH AB 2003-2026 | 2026-04-24 00:52:05 |