Internet Engineering Task Force N. Elkins Internet-Draft Inside Products, Inc. Intended status: Standards Track M. Ackermann Expires: 8 April 2025 BCBS Michigan A. Deshpande NITK Surathkal/Google T. Pecorella University of Florence A. Rashid Politecnico di Bari 5 October 2024 IPv6 Performance and Diagnostic Metrics Version 2 (PDMv2) Destination Option draft-ietf-ippm-encrypted-pdmv2-09 Abstract RFC8250 describes an optional Destination Option (DO) header embedded in each packet to provide sequence numbers and timing information as a basis for measurements. As this data is sent in clear-text, this may create an opportunity for malicious actors to get information for subsequent attacks. This document defines PDMv2 which has a lightweight handshake (registration procedure) and encryption to secure this data. Additional performance metrics which may be of use are also defined. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://ameyand.github.io/PDMv2/draft-elkins-ippm-encrypted- pdmv2.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-ietf-ippm-encrypted-pdmv2/. Discussion of this document takes place on the IP Performance Measurement Working Group mailing list (mailto:ippm@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/ippm/. Subscribe at https://www.ietf.org/mailman/listinfo/ippm/. Source for this draft and an issue tracker can be found at https://github.com/ameyand/PDMv2. Elkins, et al. Expires 8 April 2025 [Page 1] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 8 April 2025. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Conventions used in this document . . . . . . . . . . . . . . 4 3. PDMv2 Destination Options . . . . . . . . . . . . . . . . . . 4 3.1. Destinations Option Header . . . . . . . . . . . . . . . 4 3.2. Metrics information in PDMv2 . . . . . . . . . . . . . . 4 3.3. PDMv2 Layout . . . . . . . . . . . . . . . . . . . . . . 6 4. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 8 5. Protocol Flow . . . . . . . . . . . . . . . . . . . . . . . . 9 5.1. Client - Server Negotiation . . . . . . . . . . . . . . . 9 5.2. Implementation Guidelines . . . . . . . . . . . . . . . . 10 5.2.1. Use Case 1: Server does not understand PDM or PDMv2 . . . . . . . . . . . . . . . . . . . . . . . . 11 5.2.2. Use Case 2: Server does not allow PDM Option (PDM or PDMv2) . . . . . . . . . . . . . . . . . . . . . . . 11 6. Security Goals . . . . . . . . . . . . . . . . . . . . . . . 11 Elkins, et al. Expires 8 April 2025 [Page 2] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 6.1. Security Goals for Confidentiality . . . . . . . . . . . 12 6.2. Security Goals for Integrity . . . . . . . . . . . . . . 12 6.3. Security Goals for Authentication . . . . . . . . . . . . 12 6.4. Cryptographic Algorithm . . . . . . . . . . . . . . . . . 12 7. Security Considerations . . . . . . . . . . . . . . . . . . . 13 7.1. Limited Threat Model . . . . . . . . . . . . . . . . . . 13 7.1.1. Passive attacks with unencrypted PDMv2 . . . . . . . 13 7.1.2. Passive attacks with encrypted PDMv2 . . . . . . . . 14 7.1.3. Active attacks with unencrypted PDMv2 . . . . . . . . 15 7.1.4. Active attacks with encrypted PDMv2 . . . . . . . . . 16 7.2. Topological considerations . . . . . . . . . . . . . . . 17 7.3. Further mitigations . . . . . . . . . . . . . . . . . . . 17 8. Privacy Considerations . . . . . . . . . . . . . . . . . . . 17 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 18 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 11.1. Normative References . . . . . . . . . . . . . . . . . . 19 11.2. Informative References . . . . . . . . . . . . . . . . . 19 Appendix A. Sample Implementation of Registration . . . . . . . 20 A.1. Overall summary . . . . . . . . . . . . . . . . . . . . . 20 A.2. High level flow . . . . . . . . . . . . . . . . . . . . . 20 Appendix B. Change Log . . . . . . . . . . . . . . . . . . . . . 20 Appendix C. Open Issues . . . . . . . . . . . . . . . . . . . . 20 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20 1. Introduction The current Performance and Destinations Metrics (PDM) is an IPv6 Destination Options header which provides information based on the metrics like Round-trip delay and Server delay. This information helps to measure the Quality of Service (QoS) and to assist in diagnostics. However, there are potential risks involved transmitting PDM data during a diagnostics session. PDM metrics can help an attacker understand about the type of machine and its processing capabilities. For example, the operational capabilities of either the client or server end hosts such as processing speed -- that is, if the system in question is very fast system or an older, slower device. Inferring from the PDM data, the attack can launch a timing attack. For example, if a cryptographic protocol is used, a timing attack may be launched against the keying material to obtain the secret. PDM metrics may also help the attacker find out about the network speed or capabilities of the network path. For example, are there delays or blockages? Are there alternate or multiple paths? Elkins, et al. Expires 8 April 2025 [Page 3] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Along with this, PDM does not provide integrity. It is possible for a Machine-In-The-Middle (MITM) node to modify PDM headers leading to incorrect conclusions. For example, during the debugging process using PDM header, it can mislead by showing there are no unusual server delays. PDMv2 is an IPv6 Destination Options Extension Header which adds confidentiality, integrity and authentication to PDM. The procedures specified in RFC8250 for header placement, implementation, security considerations and so on continue to apply for PDMv2. 2. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. PDMv2 Destination Options 3.1. Destinations Option Header The IPv6 Destination Options extension header [RFC8200] is used to carry optional information that needs to be examined only by a packet's destination node(s). The Destination Options header is identified by a Next Header value of 60 in the immediately preceding header and is defined in RFC 8200 [RFC8200]. The IPv6 PDMv2 destination option is implemented as an IPv6 Option carried in the Destination Options header. 3.2. Metrics information in PDMv2 The IPv6 PDMv2 destination option contains the following base fields: SCALEDTLR: Scale for Delta Time Last Received SCALEDTLS: Scale for Delta Time Last Sent GLOBALPTR: Global Pointer PSNTP: Packet Sequence Number This Packet PSNLR: Packet Sequence Number Last Received DELTATLR: Delta Time Last Received Elkins, et al. Expires 8 April 2025 [Page 4] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 DELTATLS: Delta Time Last Sent PDMv2 adds a new metric to the existing PDM [RFC8250] called the Global Pointer. The existing PDM fields are identified with respect to the identifying information called a "5-tuple". The 5-tuple consists of: SADDR: IP address of the sender SPORT: Port for the sender DADDR: IP address of the destination DPORT: Port for the destination PROTC: Upper-layer protocol (TCP, UDP, ICMP, etc.) Unlike PDM fields, Global Pointer (GLOBALPTR) field in PDMv2 is defined for the SADDR type for the node. Two SADDR address types are used: a) Link-Local b) Global Unicast Hence, there are two Global Pointers. The Global Pointer is treated as a common entity over all the 5-tuples with the same SADDR type. It is initialised to the value 1 and increments for every packet sent. Global Pointer provides a measure of the amount of IPv6 traffic sent by the PDMv2 node. When the SADDR type is Link-Local, the PDMv2 node sends Global Pointer defined for Link-Local addresses, and when the SADDR type is Global Unicast, it sends the one defined for Global Unicast addresses. The reason for the Global Pointers is to provide a rough estimation of the load on the node in question. That is, if the node is sending many other packets to other destinations at the same time as this particular session. Given that goal, if we combine the Link Local and Global Unicast, the traffic traversing the path over the LAN or VLAN (Link Local) would be combined with the traffic traversing the path over the internet or wide area network. The nature of Link- Local and Global Unicast traffic is quite different, hence the two separate counters. Elkins, et al. Expires 8 April 2025 [Page 5] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 3.3. PDMv2 Layout PDMv2 has two different header formats corresponding to whether the metric contents are encrypted or unencrypted. The difference between the two types of headers is determined from the Options Length value. Following is the representation of the unencrypted PDMv2 header: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | Vrsn | Epoch | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PSN This packet | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PSN Last Received | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Global Pointer | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ScaleDTLR | ScaleDTLS | Reserved | |-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Delta Time Last Received | Delta Time Last Sent | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Following is the representation of the encrypted PDMv2 header: 0 1 2 3 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | Vrsn | Epoch | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PSN This Packet | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Encrypted PDM Data : : (16 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Option Type 0x0F 8-bit unsigned integer. The Option Type is adopted from RFC 8250 [RFC8250]. Option Length 0x22: Unencrypted PDM Elkins, et al. Expires 8 April 2025 [Page 6] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 0x22: Encrypted PDM 8-bit unsigned integer. Length of the option, in octets, excluding the Option Type and Option Length fields. Version Number 0x2 4-bit unsigned number. Epoch 12-bit unsigned number. Epoch field is used to indicate the valid SessionTemporaryKey. Packet Sequence Number This Packet (PSNTP) 32-bit unsigned number. This field is initialized at a random number and is incremented sequentially for each packet of the 5-tuple. This field + Epoch are used in the Encrypted PDMv2 as the encryption nonce. The nonce MUST NOT be reused in different sessions. Packet Sequence Number Last Received (PSNLR) 32-bit unsigned number. This field is the PSNTP of the last received packet on the 5-tuple. Global Pointer 32-bit unsigned number. Global Pointer is initialized to 1 for the different source address types and incremented sequentially for each packet with the corresponding source address type. This field stores the Global Pointer type corresponding to the SADDR type of the packet. Scale Delta Time Last Received (SCALEDTLR) Elkins, et al. Expires 8 April 2025 [Page 7] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 8-bit unsigned number. This is the scaling value for the Delta Time Last Sent (DELTATLS) field. Scale Delta Time Last Sent (SCALEDTLS) 8-bit unsigned number. This is the scaling value for the Delta Time Last Sent (DELTATLS) field. Reserved Bits 16-bits. Reserved bits for future use. They MUST be set to zero on transmission and ignored on receipt per [RFC3552]. Delta Time Last Received (DELTATLR) 16-bit unsigned integer. The value is set according to the scale in SCALEDTLR. Delta Time Last Received = (send time packet n - receive time packet (n - 1)) Delta Time Last Sent (DELTATLS) 16-bit unsigned integer. The value is set according to the scale in SCALEDTLS. Delta Time Last Sent = (receive time packet n - send time packet (n - 1)) 4. Terminology * Endpoint Node: Creates cryptographic keys in collaboration with a partner. * Client: An Endpoint Node which initiates a session with a listening port on another Endpoint Node and sends PDM data. * Server: An Endpoint Node which has a listening port and sends PDM data to another Endpoint Node. Elkins, et al. Expires 8 April 2025 [Page 8] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Note: a client may act as a server (have listening ports). * Public and Private Keys: A pair of keys that is used in asymmetric cryptography. If one is used for encryption, the other is used for decryption. Private Keys are kept hidden by the source of the key pair generator, but the Public Key may be known to everyone. In this document, the Public Key is represented as pkX and the Private Key as skX (where X can be any client or server). * Pre-shared Key (PSK): A symmetric key. Uniformly random bitstring, shared between any Client or any Server or a key shared between an entity that forms client-server relationship. This could happen through an out-of band mechanism: e.g., a physical meeting or use of another protocol. * Shared Secret: A piece of data, known only to the parties involved. * SessionTemporaryKey: A A temporary key used to secure data for only the current session 5. Protocol Flow The protocol will proceed in 2 steps. Step 1: Creation of cryptographic secrets between Server and Client. This includes the creation of pkX and skX. Step 2: PDM data flow between Client and Server. These steps MAY be in the same session or in separate sessions. That is, the cryptographic secrets MAY be created beforehand and used in the PDM data flow at the time of the "real" data session. After-the-fact (or real-time) data analysis of PDM flow may occur by network diagnosticians or network devices. The definition of how this is done is out of scope for this document. 5.1. Client - Server Negotiation The two entities exchange a set of data to ensure the respective identities. This could be done via a TLS or other session. The exact nature of the identity verification is out-of-scope for this document. They use Hybrid Public-Key Encryption scheme (HPKE) Key Encapsulation Mechanism (KEM) to negotiate a "SharedSecret". Elkins, et al. Expires 8 April 2025 [Page 9] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Each Client and Server derive a "SessionTemporaryKey" by using HPKE Key Derivation Function (KDF), using the following inputs: * The "SharedSecret". * The 5-tuple (SrcIP, SrcPort, DstIP, DstPort, Protocol) of the communication. * An Epoch. The Epoch SHOULD be initialized to zero. A change in the Epoch indicates that the SessionTemporaryKey has been rotated. The Epoch MUST be incremented when the Packet Sequence Number This Packet (PSNTP) is rolled over. It MAY be incremented earlier, depending on the implementation and the security considerations. The sender MUST NOT create two packets with identical PSNTP and Epoch. When the Epoch overflows, then collection of PDM data for this session will be stopped. An error message MUST be sent as per [RFC9180]: MessageLimitReachedError: Context AEAD sequence number overflow. 5.2. Implementation Guidelines How should a network administrator decide whether a client should use PDM, unencrypted PDMv2, or encrypted PDMv2? This decision is a network policy issue. The administrator must be aware that PDM or unencrypted PDMv2 might expose too much information to malicious parties. That said, if the network administrator decides that taking such a risk within their network is acceptable, then they should make the decision that is appropriate for their network. Alternatively, the network administrator might choose to create a policy that prohibits the use of PDM or unencrypted PDMv2 on their network. The implementation SHOULD provide a way for the network administrator to enforce such a policy. The server and client implementations SHOULD support PDM, unencrypted PDMv2, and encrypted PDMv2. If a client chooses a certain mechanism (e.g., PDM), the server MAY respond with the same mechanism, unless the network administrator has selected a policy that only allows certain mechanisms on their network. Elkins, et al. Expires 8 April 2025 [Page 10] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 5.2.1. Use Case 1: Server does not understand PDM or PDMv2 If a client sends a packet with PDM or PDMv2 and the server does not have code which understands the header, the packet is processed according to the Option Type which is defined in RFC8250 and is in accordance with RFC8200. The Option Type identifiers is coded to skip over this option and continue processing the header. 5.2.2. Use Case 2: Server does not allow PDM Option (PDM or PDMv2) If a client sends a packet with a PDM option which does not match the network policy, then the PDM option MUST be ignored and processing continue normally. The server SHOULD log such occurrences. Filtering at routers per [RFC9288] on filtering of IPv6 extension headers may impact the receipt of PDM / PDMv2. 6. Security Goals As discussed in the introduction, PDM data can represent a serious data leakage in presence of a malicious actor. In particular, the sequence numbers included in the PDM header allows correlating the traffic flows, and the timing data can highlight the operational limits of a server to a malicious actor. Moreover, forging PDM headers can lead to unnecessary, unwanted, or dangerous operational choices, e.g., to restore an apparently degraded Quality of Service (QoS). Due to this, it is important that the confidentiality and integrity of the PDM headers is maintained. PDM headers can be encrypted and authenticated using the methods discussed in Section 5.4, thus ensuring confidentiality and integrity. However, if PDM is used in a scenario where the integrity and confidentiality is already ensured by other means, they can be transmitted without encryption or authentication. This includes, but is not limited to, the following cases: a) PDM is used over an already encrypted medium (For example VPN tunnels). b) PDM is used in a link-local scenario. c) PDM is used in a corporate network where there are security measures strong enough to consider the presence of a malicious actor a negligible risk. Elkins, et al. Expires 8 April 2025 [Page 11] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 6.1. Security Goals for Confidentiality PDM data MUST be kept confidential between the intended parties, which includes (but is not limited to) the two entities exchanging PDM data, and any legitimate party with the proper rights to access such data. 6.2. Security Goals for Integrity An implementation SHOULD attempt to detect if PDM data is forged or modified by a malicious entity. In other terms, the implementation should attempt to detect if a malicious entity has generated a valid PDM header impersonating an endpoint or modified a valid PDM header. 6.3. Security Goals for Authentication An unauthorized party MUST NOT be able to send PDM data and MUST NOT be able to authorize another entity to do so. Alternatively, if authentication is done via any of the following, this requirement MAY be considered to be met. a) PDM is used over an already authenticated medium (For example, TLS session). b) PDM is used in a link-local scenario. c) PDM is used in a corporate network where security measures are strong enough to consider the presence of a malicious actor a negligible risk. 6.4. Cryptographic Algorithm Symmetric key cryptography has performance benefits over asymmetric cryptography; asymmetric cryptography is better for key management. Encryption schemes that unite both have been specified in [RFC1421], and have been participating practically since the early days of public-key cryptography. The basic mechanism is to encrypt the symmetric key with the public key by joining both yields. Hybrid public-key encryption schemes (HPKE) [RFC9180] used a different approach that generates the symmetric key and its encapsulation with the public key of the receiver. Elkins, et al. Expires 8 April 2025 [Page 12] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 It is RECOMMENDED to use the HPKE framework that incorporates key encapsulation mechanism (KEM), key derivation function (KDF) and authenticated encryption with associated data (AEAD). These multiple schemes are more robust and significantly more efficient than other schemes. While the schemes may be negotiated between communicating parties, it is RECOMMENDED to use default encryption algorithm for HPKE AEAD as AES-128-GCM. 7. Security Considerations PDMv2 carries metadata, including information about network characteristics and end-to-end response time. This metadata is used to optimize communication. However, in the context of passive attacks, the information contained within PDMv2 packets can be intercepted by an attacker, and in the context of active attacks the metadata can be modified by an attacker. In the following we will briefly outline the threat model and the associated security risks, using RFC3552 terminology and classification. 7.1. Limited Threat Model We assume that the attacker does not control the endpoints, but it does have a limited control of the network, i.e., it can either monitor the communications (leading to passive attacks), or modify/ forge packets (active attacks). 7.1.1. Passive attacks with unencrypted PDMv2 Passive Attack Scenario: In a passive attack, the attacker seeks to obtain information that the sender and receiver of the communication would prefer to keep private. In this case, the attacker is not altering the packets but is intercepting and analyzing them. Here's how this can happen in the context of unencrypted PDMv2: a. Being on the same LAN: The simplest way for an attacker to launch a passive attack is to be on the same Local Area Network (LAN) as the victim. Many LAN configurations, such as Ethernet, 802.3, and FDDI, allow any machine on the network to read all traffic destined for any other machine on the same LAN. This means that if PDM packets are sent over the LAN, the attacker can capture them. Elkins, et al. Expires 8 April 2025 [Page 13] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 b. Control of a Host in the Communication Path: If the attacker has control over a host that lies in the communication path between two victim machines, they can intercept PDM packets as they pass through this compromised host. This allows the attacker to collect metadata without being on the same LAN as the victim. c. Compromising Routing Infrastructure: In some cases, attackers may actively compromise the routing infrastructure to route traffic through a compromised machine. This can facilitate a passive attack on victim machines. By manipulating routing, the attacker can ensure that PDMv2 packets pass through their controlled node. d. Wireless Networks: Wireless communication channels, such as those using 802.11 (Wi-Fi), are particularly vulnerable to passive attacks. Since data is broadcast over well-known radio frequencies, an attacker with the ability to receive those transmissions can intercept PDMv2 packets. Weak or ineffective cryptographic protection in wireless networks can make it easier for attackers to capture this data. Goal of Passive Attack: In a passive attack, the attacker's goal is to obtain sensitive information from intercepted packets. In the case of PDMv2, this information may include network characteristics, end-to-end response times, and potentially any other metadata that is transmitted. This information can be valuable to the attacker for various purposes, such as analyzing network performance or gaining insights into communication patterns. In summary, within the limited Internet threat model described in RFC3552, attackers with the ability to intercept packets can conduct passive attacks to capture metadata carried in IPv6 unencrypted PDMv2 packets. This information can be useful for the attacker, even without actively altering the communication. Security measures, such as encryption and network segmentation, are important countermeasures to protect against such passive attacks. 7.1.2. Passive attacks with encrypted PDMv2 Passive Attack Scenario: An attacker is trying to seek useful information from encrypted PDMv2 packets happening between two different entities. Encrypted PDMv2 has most of the metadata fields encrypted except for PSNTP which is also used as a nonce in HPKE AEAD. Elkins, et al. Expires 8 April 2025 [Page 14] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Goal of Passive Attack: In this attack, the attacker is trying to obtain the order in which the packets were sent from the sender to the receiver for different flows. The amount of information gathered by the attacker is similar, to some extent, to the ones available by inspecting the TTCP sequence number, which is also usually not protected. Therefore, we consider this information leak acceptable. Nevertheless, this point should be noted if complete traffic obfuscation (including packet reordering) is necessary. In these cases it is suggested to use IPSec ESP [RFC4303] in tunnel mode (in which case the PDMv2 can be used unencrypted). 7.1.3. Active attacks with unencrypted PDMv2 There are also active attacks within the context of the limited Internet threat model defined in [RFC3552]. In this model, active attacks involve an attacker writing data to the network, and the attacker can forge packets and potentially manipulate the behavior of devices or networks. Let's break down how message modification, deletion, or insertion by attackers using the unencrypted IPv6 Performance and Destination option v2 (PDMv2) fits into this threat model: 1. Message Modification Attack: In a message modification attack, the attacker intercepts a message, modifies its content, and then reinserts it into the network. This attack is significant because it allows the attacker to tamper with the integrity of the data being transmitted. Example: Suppose an attacker intercepts an IPv6 packet containing unencrypted PDMv2 information that includes network and end-to- end response time metadata. The attacker modifies this information, such as altering the response time data or inserting false information. When this modified packet reaches its destination, the receiving device or network may act based on this malicious information, potentially leading to degraded performance, incorrect network management decisions, wrong performance data collection, etc. A direct consequence of modifying the performance data could be, for example, to hide an ongoing QoS violation, or to create a fake QoS violation, with consequences on the violation of Service Level Agreements. 2. Message Deletion Attack: Elkins, et al. Expires 8 April 2025 [Page 15] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 In a message deletion attack, the attacker removes a message from the network. This attack can be used in conjunction with other attacks to disrupt communication or achieve specific objectives. Example: Consider a scenario where an attacker deletes certain IPv6 packets that contain unencrypted PDMv2 information, or deletes the PDM header from the packet. If the PDMv2 is used for network monitoring or quality of service (QoS) management, the deletion of these packets can cause the monitoring system to miss critical data, potentially leading to inaccurate network performance analysis or decisions. 3. Message Insertion Attack: In a message insertion attack, the attacker forges a message and injects it into the network. Example: An attacker could forge IPv6 packets containing unencrypted PDMv2 data with fake source addresses and inject them into the network. If PDM is used for making routing or resource allocation decisions, these injected packets can influence the network's behavior, potentially causing it to take suboptimal routes or allocate resources incorrectly. All these attacks are considered active attacks because the attacker actively manipulates network traffic, and they can potentially spoof the source address to disguise their identity. In the limited Internet threat model defined in [RFC3552], it is assumed that attackers can forge packets and carry out such active attacks. These attacks highlight the importance of securing network protocols, authenticating messages, and implementing proper security measures to protect against them. 7.1.4. Active attacks with encrypted PDMv2 Encrypted PDMv2 provides inherent protection against active attacks like Message Modification by providing integrity. If either of the sequence number or encrypted PDMv2 contents are modified then decryption will fail. Message Deletion Attack can be performed for encrypted PDMv2 similarly to unencrypted PDMv2. Impersonation Attack: Encrypted PDMv2 relies on a shared secret negotiated by an external protocol (e.g., TLS). If key exchange does have authentication check, then an adversary who impersonates the host can derive a key with the destination client and potentially perform all the above active attacks even on encrypted PDMv2. Elkins, et al. Expires 8 April 2025 [Page 16] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 7.2. Topological considerations The same topological considerations highlighted in [RFC3552] applies in this context. Passive attacks and active attacks where the messages need to be modified or deleted are more likely if the attacker is on-path, while message insertion attacks are more likely when the attacker is off-path but can happen also when the attacker is on-path. Link-local attacks can be considered as a special case of on-path for PDM, i.e., for PDM a link-local attacker has no special privileges with respect to an on-path attacker. 7.3. Further mitigations PDM includes cryptographic mechanisms to mitigate passive and active attacks. As a further security mechanism to protect from active attacks, it is possible for an implementation to include logging of anomalous events, e.g.: * Missing PDM header when expected (counteracts the Message Deletion). * Unusual variations of the PDM data (counteracts the Message Modification) * Accept the PDM data only if the application level accepts the packet payload (counteracts the Message Insertion) * Monitor repeated or unexpected PDM data (counteracts replay attacks). Security considerations about HPKE are addressed in RFC 9180. Security considerations about PDM are addressed in RFC 8250. Security considerations about destination objects are addressed in RFC 8200. 8. Privacy Considerations Encryption plays a crucial role in providing privacy as defined by [RFC6973], especially when metadata sniffing is a concern. [RFC6973], titled "Privacy Considerations for Internet Protocols," outlines the importance of protecting users' privacy in the context of various Internet protocols, including IPv6. When metadata like network and end-to-end response time is at risk of being observed by attackers, eavesdroppers, or observers, encryption can help mitigate the privacy risks. Here's how encryption achieves this: Elkins, et al. Expires 8 April 2025 [Page 17] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 a) Confidentiality: Encryption ensures that the actual content of the communication remains confidential. Even if attackers or observers intercept the data packets, they won't be able to decipher the information without the encryption key. In the case of IPv6 Performance and Destination Option (PDM), the still- visible, non-encrypted metadata is still visiblenegligible, and does not poses confidentiality b) Content Protection: Metadata, such as network and end-to-end response time, may reveal sensitive information about the communication. By encrypting the content, encryption mechanisms help protect this sensitive data from being exposed. Observers may still see that communication is happening, but they won't be able to glean meaningful information from the metadata. c) Integrity: Encryption often includes mechanisms to ensure data integrity. It allows the recipient to verify that the received data has not been tampered with during transit. This helps protect against attackers who might try to manipulate the metadata. It's important to note that while encryption enhances privacy by protecting the content of communication, metadata still poses some challenges. Metadata, such as the fact that communication is occurring and the parties involved, can be revealing. To address this, additional techniques, like traffic obfuscation, may be used to hide metadata patterns. However, complete metadata privacy can be challenging to achieve, especially when communication protocols inherently require some level of metadata exchange. Specifically, enabling PDM only for a specific set of flows can pose a risk of highlighting their presence between two parties. As a mitigation technique, it is suggested to obfuscate the events, for example by enabling PDM on more flows than strictly necessary. 9. IANA Considerations No action is needed by IANA. 10. Contributors The authors wish to thank NITK Surathkal for their support and assistance in coding and review. In particular Dr. Mohit Tahiliani and Abhishek Kumar (now with Google). Thanks also to Priyanka Sinha for her comments. Thanks to the India Internet Engineering Society (iiesoc.in), in particular Dhruv Dhody, for his comments and for providing the funding for servers needed for protocol development. Thanks to Balajinaidu V, Amogh Umesh, and Chinmaya Sharma of NITK for Elkins, et al. Expires 8 April 2025 [Page 18] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 developing the PDMv2 implementation for testing. 11. References 11.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC Text on Security Considerations", BCP 72, RFC 3552, DOI 10.17487/RFC3552, July 2003, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", STD 86, RFC 8200, DOI 10.17487/RFC8200, July 2017, . [RFC8250] Elkins, N., Hamilton, R., and M. Ackermann, "IPv6 Performance and Diagnostic Metrics (PDM) Destination Option", RFC 8250, DOI 10.17487/RFC8250, September 2017, . 11.2. Informative References [RFC1421] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", RFC 1421, DOI 10.17487/RFC1421, February 1993, . [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, DOI 10.17487/RFC4303, December 2005, . [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., and R. Smith, "Privacy Considerations for Internet Protocols", RFC 6973, DOI 10.17487/RFC6973, July 2013, . Elkins, et al. Expires 8 April 2025 [Page 19] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 [RFC9180] Barnes, R., Bhargavan, K., Lipp, B., and C. Wood, "Hybrid Public Key Encryption", RFC 9180, DOI 10.17487/RFC9180, February 2022, . [RFC9288] Gont, F. and W. Liu, "Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers", RFC 9288, DOI 10.17487/RFC9288, August 2022, . Appendix A. Sample Implementation of Registration A.1. Overall summary In the Registration phase, the objective is to generate a shared secret that will be used in encryption and decryption during the Data Transfer phase. How this is to be done is left to the implementation. A.2. High level flow The following steps describe the protocol flow: 1. Client initiates a request to the Server. The request contains a list of available ciphersuites for KEM, KDF, and AEAD. 2. Server responds to the Client with one of the available ciphersuites and shares its pkX. 3. Client generates a secret and its encapsulation. The Client sends the encapsulation and a salt to the Server. The salt is required during KDF in the Data Transfer phase. 4. Server generates the secret with the help of the encapsulation and responds with a status message. Appendix B. Change Log Note to RFC Editor: if this document does not obsolete an existing RFC, please remove this appendix before publication as an RFC. Appendix C. Open Issues Note to RFC Editor: please remove this appendix before publication as an RFC. Authors' Addresses Elkins, et al. Expires 8 April 2025 [Page 20] Internet-Draft draft-ietf-ippm-encrypted-pdmv2 October 2024 Nalini Elkins Inside Products, Inc. United States Email: nalini.elkins@insidethestack.com Michael Ackermann BCBS Michigan United States Email: mackermann@bcbsm.com Ameya Deshpande NITK Surathkal/Google India Email: ameyanrd@gmail.com Tommaso Pecorella University of Florence Italy Email: tommaso.pecorella@unifi.it Adnan Rashid Politecnico di Bari Italy Email: adnan.rashid@poliba.it Elkins, et al. Expires 8 April 2025 [Page 21]