Microsoft have released a beowulf distro. Linus has joined redhat. Slackware is closing down. Linux now runs on single entangled electrons at MIT ......
;) wake up, its april fools day guys !!!!! -js ----- Original Message ----- From: "Raj Mathur" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Tuesday, April 01, 2003 10:07 AM Subject: [ilugd]: New RFC: RFC3514 : Network Working Group S. Bellovin : Request for Comments: 3514 AT&T Labs Research : Category: Informational 1 April 2003 : : : The Security Flag in the IPv4 Header : : Status of this Memo : : This memo provides information for the Internet community. It does : not specify an Internet standard of any kind. Distribution of this : memo is unlimited. : : Copyright Notice : : Copyright (C) The Internet Society (2003). All Rights Reserved. : : Abstract : : Firewalls, packet filters, intrusion detection systems, and the like : often have difficulty distinguishing between packets that have : malicious intent and those that are merely unusual. We define a : security flag in the IPv4 header as a means of distinguishing the two : cases. : : 1. Introduction : : Firewalls [CBR03], packet filters, intrusion detection systems, and : the like often have difficulty distinguishing between packets that : have malicious intent and those that are merely unusual. The problem : is that making such determinations is hard. To solve this problem, : we define a security flag, known as the "evil" bit, in the IPv4 : [RFC791] header. Benign packets have this bit set to 0; those that : are used for an attack will have the bit set to 1. : : 1.1. Terminology : : The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, : SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this : document, are to be interpreted as described in [RFC2119]. : : 2. Syntax : : The high-order bit of the IP fragment offset field is the only unused : bit in the IP header. Accordingly, the selection of the bit position : is not left to IANA. : : : : : : Bellovin Informational [Page 1] : : RFC 3514 The Security Flag in the IPv4 Header 1 April 2003 : : : The bit field is laid out as follows: : : 0 : +-+ : |E| : +-+ : : Currently-assigned values are defined as follows: : : 0x0 If the bit is set to 0, the packet has no evil intent. Hosts, : network elements, etc., SHOULD assume that the packet is : harmless, and SHOULD NOT take any defensive measures. (We note : that this part of the spec is already implemented by many common : desktop operating systems.) : : 0x1 If the bit is set to 1, the packet has evil intent. Secure : systems SHOULD try to defend themselves against such packets. : Insecure systems MAY chose to crash, be penetrated, etc. : : 3. Setting the Evil Bit : : There are a number of ways in which the evil bit may be set. Attack : applications may use a suitable API to request that it be set. : Systems that do not have other mechanisms MUST provide such an API; : attack programs MUST use it. : : Multi-level insecure operating systems may have special levels for : attack programs; the evil bit MUST be set by default on packets : emanating from programs running at such levels. However, the system : MAY provide an API to allow it to be cleared for non-malicious : activity by users who normally engage in attack behavior. : : Fragments that by themselves are dangerous MUST have the evil bit : set. If a packet with the evil bit set is fragmented by an : intermediate router and the fragments themselves are not dangerous, : the evil bit MUST be cleared in the fragments, and MUST be turned : back on in the reassembled packet. : : Intermediate systems are sometimes used to launder attack : connections. Packets to such systems that are intended to be relayed : to a target SHOULD have the evil bit set. : : Some applications hand-craft their own packets. If these packets are : part of an attack, the application MUST set the evil bit by itself. : : In networks protected by firewalls, it is axiomatic that all : attackers are on the outside of the firewall. Therefore, hosts : inside the firewall MUST NOT set the evil bit on any packets. : : : : Bellovin Informational [Page 2] : : RFC 3514 The Security Flag in the IPv4 Header 1 April 2003 : : : Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil : bit on such packets. "Transparent" http and email proxies SHOULD set : the evil bit on their reply packets to the innocent client host. : : Some hosts scan other hosts in a fashion that can alert intrusion : detection systems. If the scanning is part of a benign research : project, the evil bit MUST NOT be set. If the scanning per se is : innocent, but the ultimate intent is evil and the destination site : has such an intrusion detection system, the evil bit SHOULD be set. : : 4. Processing of the Evil Bit : : Devices such as firewalls MUST drop all inbound packets that have the : evil bit set. Packets with the evil bit off MUST NOT be dropped. : Dropped packets SHOULD be noted in the appropriate MIB variable. : : Intrusion detection systems (IDSs) have a harder problem. Because of : their known propensity for false negatives and false positives, IDSs : MUST apply a probabilistic correction factor when evaluating the evil : bit. If the evil bit is set, a suitable random number generator : [RFC1750] must be consulted to determine if the attempt should be : logged. Similarly, if the bit is off, another random number : generator must be consulted to determine if it should be logged : despite the setting. : : The default probabilities for these tests depends on the type of IDS. : Thus, a signature-based IDS would have a low false positive value but : a high false negative value. A suitable administrative interface : MUST be provided to permit operators to reset these values. : : Routers that are not intended as as security devices SHOULD NOT : examine this bit. This will allow them to pass packets at higher : speeds. : : As outlined earlier, host processing of evil packets is operating- : system dependent; however, all hosts MUST react appropriately : according to their nature. : : 5. Related Work : : Although this document only defines the IPv4 evil bit, there are : complementary mechanisms for other forms of evil. We sketch some of : those here. : : For IPv6 [RFC2460], evilness is conveyed by two options. The first, : a hop-by-hop option, is used for packets that damage the network, : such as DDoS packets. The second, an end-to-end option, is for : packets intended to damage destination hosts. In either case, the : : : : Bellovin Informational [Page 3] : : RFC 3514 The Security Flag in the IPv4 Header 1 April 2003 : : : option contains a 128-bit strength indicator, which says how evil the : packet is, and a 128-bit type code that describes the particular type : of attack intended. : : Some link layers, notably those based on optical switching, may : bypass routers (and hence firewalls) entirely. Accordingly, some : link-layer scheme MUST be used to denote evil. This may involve evil : lambdas, evil polarizations, etc. : : DDoS attack packets are denoted by a special diffserv code point. : : An application/evil MIME type is defined for Web- or email-carried : mischief. Other MIME types can be embedded inside of evil sections; : this permit easy encoding of word processing documents with macro : viruses, etc. : : 6. IANA Considerations : : This document defines the behavior of security elements for the 0x0 : and 0x1 values of this bit. Behavior for other values of the bit may : be defined only by IETF consensus [RFC2434]. : : 7. Security Considerations : : Correct functioning of security mechanisms depend critically on the : evil bit being set properly. If faulty components do not set the : evil bit to 1 when appropriate, firewalls will not be able to do : their jobs properly. Similarly, if the bit is set to 1 when it : shouldn't be, a denial of service condition may occur. : : 8. References : : [CBR03] W.R. Cheswick, S.M. Bellovin, and A.D. Rubin, "Firewalls : and Internet Security: Repelling the Wily Hacker", Second : Edition, Addison-Wesley, 2003. : : [RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791, September : 1981. : : [RFC1750] Eastlake, D., 3rd, Crocker, S. and J. Schiller, "Randomness : Recommendations for Security", RFC 1750, December 1994. : : [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate : Requirement Levels", BCP 14, RFC 2119, March 1997. : : [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an : IANA Considerations Section in RFCs", BCP 26, RFC 2434, : October 1998. : : : : Bellovin Informational [Page 4] : : RFC 3514 The Security Flag in the IPv4 Header 1 April 2003 : : : [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 : (IPv6) Specification", RFC 2460, December 1998. : : [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network : Address Translator (Traditional NAT)", RFC 3022, January : 2001. : : 9. Author's Address : : Steven M. Bellovin : AT&T Labs Research : Shannon Laboratory : 180 Park Avenue : Florham Park, NJ 07932 : : Phone: +1 973-360-8656 : EMail: [EMAIL PROTECTED] : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Bellovin Informational [Page 5] : : RFC 3514 The Security Flag in the IPv4 Header 1 April 2003 : : : 10. Full Copyright Statement : : Copyright (C) The Internet Society (2003). All Rights Reserved. : : This document and translations of it may be copied and furnished to : others, and derivative works that comment on or otherwise explain it : or assist in its implementation may be prepared, copied, published : and distributed, in whole or in part, without restriction of any : kind, provided that the above copyright notice and this paragraph are : included on all such copies and derivative works. However, this : document itself may not be modified in any way, such as by removing : the copyright notice or references to the Internet Society or other : Internet organizations, except as needed for the purpose of : developing Internet standards in which case the procedures for : copyrights defined in the Internet Standards process must be : followed, or as required to translate it into languages other than : English. : : The limited permissions granted above are perpetual and will not be : revoked by the Internet Society or its successors or assigns. : : This document and the information contained herein is provided on an : "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING : TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING : BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION : HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF : MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. : : Acknowledgement : : Funding for the RFC Editor function is currently provided by the : Internet Society. : : : : : : : : : : : : : : : : : : : : Bellovin Informational [Page 6] : : : ================================================ : To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org : ------------------------------------------------------- This SF.net email is sponsored by: ValueWeb: Dedicated Hosting for just $79/mo with 500 GB of bandwidth! No other company gives more support or power for your dedicated server http://click.atdmt.com/AFF/go/sdnxxaff00300020aff/direct/01/ _______________________________________________ linux-india-help mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/linux-india-help
