One document matched: draft-ietf-v6ops-ipv6-discard-prefix-01.xml
<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE rfc PUBLIC '' "http://xml.resource.org/authoring/rfc2629.dtd"[
<!ENTITY RFC2119 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3552 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC3640 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3640.xml">
]>
<?xml-stylesheet type='text/xsl'
href="http://greenbytes.de/tech/webdav/rfc2629xslt/rfc2629.xslt" ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
(using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="info"
docName="draft-ietf-v6ops-ipv6-discard-prefix-01"
ipr="trust200902"
obsoletes=""
updates=""
submissionType="IETF"
xml:lang="en">
<!-- category values: std, bcp, info, exp, and historic
ipr values: full3667, noModification3667, noDerivatives3667
you can add the attributes updates="NNNN" and obsoletes="NNNN"
they will automatically be output with "(if approved)" -->
<!-- ***** FRONT MATTER ***** -->
<front>
<title abbrev="IPv6 Discard Prefix">
A Discard Prefix for IPv6
</title>
<author initials="N" surname="Hilliard" fullname="Nick Hilliard">
<organization>INEX</organization>
<address>
<postal>
<street>4027 Kingswood Road</street>
<city>Dublin</city>
<code>24</code>
<country>IE</country>
</postal>
<email>nick@inex.ie</email>
</address>
</author>
<date month="October" year="2011" />
<area>Operations and Management</area>
<workgroup>v6ops Working Group</workgroup>
<keyword>I-D</keyword>
<keyword>Internet-Draft</keyword>
<keyword>v6ops</keyword>
<abstract>
<t>
Remote triggered black hole filtering describes a method of
militating against denial-of-service attacks by selectively
discarding traffic based on source or destination address. Remote
triggered black hole routing describes a method of selectively
re-routing traffic into a sinkhole router (for further analysis)
based on destination address. This document explains why a unique
IPv6 prefix should be formally assigned by IANA for the purpose of
facilitating IPv6 remote triggered black hole filtering and routing.
</t>
</abstract>
</front>
<middle>
<section title="Introduction">
<t>
Remote triggered black hole (RTBH) filtering describes a class of
methods of blocking IP traffic either from a specific source or to a
specific destination on a network. Remote triggered black hole
(RTBH) routing describes a class of methods of re-routing IP traffic
destined to the attacked/targeted host to a special path (tunnel)
where a sniffer could capture the traffic for analysis. These
methods operate by setting the next-hop address of an IP packet with
a specified source or destination address to be a unicast prefix
which is wired locally or remotely to a router's discard, null or
tunnel interface. Typically, this information is propagated
throughout an autonomous system using a dynamic routing protocol.
By deploying RTBH systems across a network, traffic to or from
specific destinations may be selectively black-holed or re-routed to
a sinkhole device in a manner which is efficient, scalable and
straightforward to implement. For IPv4, some networks configure
RTBH installations using <xref target="RFC1918"/> address space or
the address blocks reserved for documentation in <xref
target="RFC5737"/>.
</t>
<t>
However RTBH configurations are not documentation, but operationally
important features of many public-facing production networks.
Furthermore, <xref target="RFC3849" /> specifies that the IPv6
documentation prefix should be filtered in both local and public
contexts. On this basis, it is suggested that both private network
address blocks and documentation prefixes described in <xref
target="RFC5737"/> are inappropriate for the purpose of RTBH
configurations.
</t>
<t>
While it could be argued that there are other addresses and address
prefixes which could be used for this purpose (e.g. ::/128), or that
an operator could assign an address block from their own address space
for this purposes, there is currently no operational clarity on what
address block would be appropriate or inappropriate to use for this
purpose. By creating an assigned discard prefix for IPv6, the IETF
will introduce operational clarity and good practice for
implementation of IPv6 RTBH configurations.
</t>
<section title="Notational Conventions">
<t>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref
target="RFC2119" />.
</t>
</section>
</section>
<section title="A Discard Prefix for IPv6">
<t>
For the purposes of implementing an IPv6 remote triggered black hole
configuration, a unicast address block is required. There are
currently no IPv6 unicast address blocks which are specifically
nominated for the purposes of implementing such RTBH systems.
</t>
<t>
As <xref target="RFC3882" /> and <xref target="RFC5635" /> describe
situations where more than one discard address may be used for
implementing multiple remote triggered black hole scenarios, a
single assigned prefix is not sufficient to cover all likely RTBH
situations. Consequently, an address block is required in
preference to a single address.
</t>
</section>
<section title="Operational Implications">
<t>
This assignment MAY be carried in a dynamic routing protocol within
an autonomous system. The assignment SHOULD NOT be announced to third
party autonomous systems and IPv6 traffic with an destination address
within this prefix SHOULD NOT be forwarded to third party autonomous
systems.
</t>
<t>
On networks which implement IPv6 remote triggered black holes, some or
all of this network block MAY be configured with a destination of a
discard or null interface on any or all IPv6 routers within the
autonomous system.
</t>
</section>
<section title="IANA Considerations">
<t>
This document directs IANA to record the allocation of the IPv6
address prefix xxxx/64 as a discard-only prefix in the IPv6 Address
Space registry. No end party is to be assigned this prefix. The prefix
should be allocated from ::/3.
</t>
</section>
<section title="Security Considerations">
<t>
As the prefix specified in this document should not normally be
transmitted or accepted over inter-domain BGP sessions, it is
usually appropriate to include this prefix in inter-domain BGP
prefix filters <xref target="RFC3704" />.
</t>
</section>
</middle>
<back>
<references title="Normative References">
<?rfc include="reference.RFC.3882"?> <!-- Configuring BGP to Block Denial-of-Service Attacks -->
<?rfc include="reference.RFC.5635"?> <!-- RTBH Filtering -->
</references>
<references title="Informative References">
<?rfc include="reference.RFC.1918"?> <!-- Private IPv4 address space -->
<?rfc include="reference.RFC.2119"?> <!-- Key words for use in RFCs to Indicate Requirement Levels -->
<?rfc include="reference.RFC.3704"?> <!-- Ingress Filtering for Multihomed Networks -->
<?rfc include="reference.RFC.3849"?> <!-- IPv6 Documentation Prefix -->
<?rfc include="reference.RFC.5226"?> <!-- IANA Considerations Section Guidelines -->
<?rfc include="reference.RFC.5737"?> <!-- IPv4 Documentation Prefixes -->
</references>
</back>
</rfc>
| PAFTECH AB 2003-2026 | 2026-04-24 03:15:58 |